Help for Kaspersky Web Traffic Security
- Kaspersky Web Traffic Security
- Licensing the application
- Scaling Kaspersky Web Traffic Security
- Installation and initial configuration of the application from an RPM or DEB package
- Installation and initial configuration of the application deployed from an ISO image
- Deploying a virtual machine in the VMware ESXi Hypervisor Management Console
- Deploying a virtual machine in the VMware vSphere web interface
- Deploying a virtual machine in the Management Console of Microsoft Hyper-V Manager
- Deploying a virtual machine using Microsoft SCVMM
- Application installation and initial configuration
- Removing an application deployed from an ISO image
- Preparing to remove the application
- Removing the application from a physical server
- Removing a virtual machine in the VMware ESXi Hypervisor Management Console
- Removing a virtual machine in the VMware vSphere web interface
- Removing a virtual machine in the Microsoft Hyper-V Hypervisor Management Console
- Removing a virtual machine using Microsoft SCVMM
- Getting started with the application
- Monitoring application operation
- Reports
- Kaspersky Web Traffic Security event log
- Using traffic processing rules
- Scenario for configuring access to web resources
- Adding a bypass rule
- Adding an access rule
- Adding a protection rule
- Configuring a rule triggering initiator
- Configuring traffic filtering
- Adding an exclusion for a traffic processing rule
- Configuring the schedule of a traffic processing rule
- Modifying a traffic processing rule
- Deleting a traffic processing rule
- Creating a copy of a traffic processing rule
- Enabling and disabling a traffic processing rule
- Changing the order of applied rules
- Working with traffic processing rule groups
- Configuring a default protection policy
- Monitoring traffic processing rules
- Managing workspaces
- Working with roles and user accounts
- Managing the cluster
- Creating a new cluster
- Configuring the display of the cluster node table
- Viewing information about a cluster node
- Adding a node to a cluster
- Modifying node settings
- Removing a node from a cluster
- Changing the role of a node in a cluster
- Deleting the cluster
- Checking data integrity
- Connecting to cluster nodes over the SSH protocol
- Restarting a cluster node
- Application operation in emergency mode
- Protecting network traffic
- ICAP server settings
- Block page
- Exporting and importing settings
- Upgrading the application from version 6.0 to version 6.1
- Installing update packages
- Installing the kwts_upgrade_6.1.0.4762_os_security_november_2024 update package
- Configuring the server time
- Configuring proxy server connection settings
- Updating Kaspersky Web Traffic Security databases
- Participating in Kaspersky Security Network and using Kaspersky Private Security Network
- Connecting to a LDAP server
- Configuring integration with Kaspersky Anti Targeted Attack Platform
- Syslog event log
- Application management over the SNMP protocol
- Single Sign-On authentication
- Managing the settings of a built-in proxy server in the application web interface
- Decrypting TLS/SSL connections
- Processing CONNECT requests
- About TLS connections
- Managing certificates for intercepting SSL connections
- Enabling and disabling decryption of SSL connections
- Selecting the default action for SSL connections
- Managing SSL rules
- Managing trusted certificates
- Sources of information about the application
- Publishing application events to a SIEM system
- Contacting the Technical Support
- Appendix 1. Installing and configuring the Squid service
- Appendix 2. Configuring integration of the Squid service with Active Directory
- Configuring Kerberos authentication
- Configuring NTLM authentication
- Installing the Samba service
- Configuring time synchronization
- Configuring DNS
- Configuring Samba on the server hosting the Squid service
- Checking Samba settings on the server hosting the Squid service
- Configuring the Squid service
- Configuring the client side of NTLM authentication
- Configuring NTLM authentication of a host that is not in a domain
- Configuring Basic authentication
- Appendix 3. Configuring ICAP balancing using HAProxy
- Appendix 4. MIME types of objects
- Appendix 5. URL normalization
- Appendix 6. Website categories
- Appendix 7. Physical processor core bandwidth values depending on the type of proxy server and the required protection level
- Appendix 8. Virtual processor bandwidth values depending on the type of proxy server and the required protection level
- Glossary
- Access rule
- Basic authentication
- Bypass rule
- Certificate fingerprint
- Cluster
- Directory service
- Heuristic analysis
- ICAP server
- Kaspersky Private Security Network
- Kaspersky Security Network (KSN)
- Kerberos authentication
- Keytab file
- Layout
- LDAP
- License serial number
- Malicious links
- MIB (Management Information Base)
- nginx service
- Node with role Control
- Node with role Secondary
- Normalization
- NTLM authentication
- Phishing
- Protection rule
- PTR record
- Replay cache
- Reputation filtering
- SELinux (Security-Enhanced Linux)
- Service principal name (SPN)
- SIEM system
- SNI (Server Name Indication)
- SNMP agent
- SNMP trap
- Squid
- SRV record
- SSL Bumping
- Syslog
- TLS encryption
- Tracing
- Traffic processing rule
- Update source
- Virus
- Workspace
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Creating a virtual machine using Microsoft SCVMM
If a Microsoft Hyper-V hypervisor is connected to a Microsoft System Center infrastructure, you can create a virtual machine using Microsoft SCVMM.
To create a virtual machine:
- Start the Virtual Machine Manager (VMM).
- In the lower-left corner of the window, select the VMs and Services section.
- In the toolbar, click the Create Virtual Machine button and select Create Virtual Machine from the drop-down list.
The Virtual Machine Creation Wizard opens.
- Follow the steps of the Wizard:
- Select the virtual machine creation method.
- Select the Create the new virtual machine with a blank virtual hard disk option.
This method lets you manually configure the settings and hardware configuration of the virtual machine.
- Click Next.
The Wizard proceeds to the next step.
- Select the Create the new virtual machine with a blank virtual hard disk option.
- Specify the virtual machine name and generation.
- In the Virtual machine name field, enter the name of the virtual machine.
The name must be unique among the names of all existing virtual machines.
- In the Generation drop-down list, select Generation 1.
- Click Next.
The Wizard proceeds to the next step.
- In the Virtual machine name field, enter the name of the virtual machine.
- Set the virtual machine hardware configuration.
- In the Compatibility section, select the Hyper-V check box.
- In the General settings group, in the Processor section, specify the number of virtual processors in the Number of processors field.
The minimum recommended value is 8. You can specify a larger value if you require higher performance of the virtual machine.
- In the General settings group, in the Memory section:
- Select the Static option.
- In the Virtual machine memory field, specify the amount of RAM that will be allocated for the virtual machine.
The minimum recommended value is 16384 MB. You can specify a larger value if you require higher performance of the virtual machine.
- In the Bus configuration settings group, in the IDE Devices → <drive name> section:
- In the Type drop-down list, select the Fixed virtual drive type.
- In the Size field, specify the amount of disk space that will be allocated for the virtual machine.
The minimum recommended value is 200 GB. You can specify a larger value if you need to save a large database for the event log.
- In the Bus configuration settings group, in the IDE Devices → Virtual DVD Drive section, select the type of virtual drive. To do so:
- Select the Existing ISO image option.
- Click Browse....
The Select ISO window opens.
- Select the ISO file that was uploaded prior to beginning installation and click OK.
- In the Network Adapters settings group, in the Network Adapter 1 section:
- Select the network adapter connection mode Connected to a VM network.
- On the right of the VM network field, click Browse....
The Select a VM Network window opens.
- Select the virtual network to which the virtual machine will connect, and click OK.
- Click Next.
The Wizard proceeds to the next step.
- Select the virtual machine accommodation type.
- Select the Place the virtual machine on a host option.
- In the Destination drop-down list, select a group of hosts for creating the virtual machine.
- Click Next.
The Wizard proceeds to the next step.
- Select the hypervisor on which the virtual machine will be created.
- In the hypervisors table of the group that was selected at the previous step, select the hypervisor on which the virtual machine will be deployed.
- Click Next.
The Wizard proceeds to the next step.
- Verify that the defined values of settings are correct.
- Verify the virtual machine settings that were defined at previous steps of the Wizard.
- Click Next.
The Wizard proceeds to the next step.
- Select the operating system.
- In the Action to take when the virtualization server stops drop-down list, select Shut down guest OS.
- In the Operating system settings group, select CentOS Linux 7 (64 bit) from the drop-down list.
- Click Next.
The Wizard proceeds to the next step.
- Confirm creation of the virtual machine.
- Verify that the virtual machine settings configured at previous steps are correct.
- If all settings are defined correctly, click Create.
- Select the virtual machine creation method.
This starts the process for creating a virtual machine with the defined settings. Make sure that the process completes correctly and that the virtual machine is displayed in the list of virtual machines of the selected hypervisor.