On Kaspersky NGFW devices and in network templates, you can specify the protocols (SSHv2, ICMP, and SNMP) and IP addresses that are allowed for access to administrative functions on the interfaces. This helps improve protection against unauthorized access.
Allowing access to the interface for administrative protocols makes the interface available for network connections from the outside, including scanning attempts. By default, all incoming connections to interfaces are denied. Access should be allowed only when necessary and only from trusted subnets.
Configuring restricted access to administrative functions is available for all interfaces with the role of a dedicated management port or data plane port that have an IP address configured. By default, interfaces with the dedicated management port role are accessible via SSHv2, ICMP, and SNMP from any subnets. Configuring access restriction is not available for L2 interfaces.
To restrict access to administrative functions:
The table of network interfaces is displayed.
You can add up to 20 IPv4 addresses with subnets. Subnets can overlap.
If the list of allowed subnets is empty, access to administrative functions is allowed from all IP addresses.
Allowing access to the interface for administrative protocols (SSH, ICMP, SNMP) makes the interface available for network connections from the outside, including scanning attempts. By default, all incoming connections to interfaces are denied. Access should be allowed only when necessary and only from trusted subnets.
Access restrictions apply only to new sessions. Sessions started before the restrictions were applied are not terminated.
Page top