Kaspersky NGFW supports integration with external DLP systems (data leak protection tools) via the ICAP protocol. In this architecture, NGFW acts as an ICAP client that extracts objects from HTTP/HTTPS traffic and sends them to an external ICAP server implemented by the third-party DLP system.
Special considerations:
Kaspersky NGFW can send the following types of objects:
Configuring ICAP using OSMP
You can use the Open Single Management Platform to configure the sending of objects extracted from HTTP/HTTPS traffic to an external system via ICAP. This allows passing objects to DLP systems.
To enable the sending of objects via ICAP:
This opens the Anti-Virus profile creation window. By default, the General tab is selected.
The name of the profile must be unique among all profiles. The maximum length is 128 characters.
The maximum length is 256 characters.
If logging is enabled, then when an attempt is made to visit a malicious web resource, an event is logged in the Anti-Virus security event log in the SIEM system. If logging is disabled, no events are generated or saved.
The new item is added to the table.
The ability to send objects via ICAP is applied to the Anti-Virus profile.
Configuring ICAP on the command line
You can use the command line to configure the sending of objects extracted from HTTP/HTTPS traffic to an external system via ICAP. This allows passing objects to DLP systems.
To enable the sending of objects via ICAP:
security antivirus> enable
security antivirus> icap-client> server <IP address>
security antivirus> icap-client> port <port>
security antivirus> icap-client> reqmod-service <service name>
security antivirus> icap-client> respmod-service <service name>
security antivirus> icap-client> monitoring-mode
security antivirus> icap-client> max-connections <number from 1 to 100>
security antivirus> profile <Anti-Virus profile name> > use-icap-client
The ability to send objects via ICAP is applied to the Anti-Virus profile.
Page top