Kaspersky Secure Mail Gateway

Network accesses used

July 3, 2024

ID 247390

Information about network accesses required by application functionality is listed in the following table.

The table does not list network accesses required by the mail server, the SNMP server, or the Syslog server. The administrator of the operating system must take steps to configure these.

Network accesses required by the application

Functionality

Protocol

Port

Direction

Purpose of the connection

Managing the application using the web interface.

TCP

443

Inbound

Application administrator's computer

Interaction of cluster nodes

TCP

9045 by default (can be change during installation)

Inbound and outbound

Other cluster nodes

DNS requests

UDP, TCP

53

Outbound

DNS server manually specified by the administrator

Connection with proxy server

TCP

8080 by default (can be changed in the application web interface)

Outbound

Proxy server

Application activation

TCP

443

Outbound

Kaspersky servers

• activation-v2.kaspersky.com

• eu.activation-v2.kaspersky.com

• americas.activation-v2.kaspersky.com

• apac.activation-v2.kaspersky.com

• china.activation-v2.kaspersky.com

• activation-v2.geo.kaspersky.com

• activate.activation-v2.kaspersky.com

Application database update

TCP

80, 443

Outbound

Kaspersky servers.

For a list of servers, see the Knowledge Base, article 6105.

KSN

TCP

443

Outbound

Kaspersky servers

• ds.kaspersky.com

• ksn-file-geo.kaspersky-labs.com

• ksn-verdict-geo.kaspersky-labs.com

• ksn-url-geo.kaspersky-labs.com

• ksn-kas-geo.kaspersky-labs.com

• ksn-a-stat-geo.kaspersky-labs.com

• ksn-info-geo.kaspersky-labs.com

• ksn-cinfo-geo.kaspersky-labs.com

• dc1.ksn.kaspersky-labs.com

• dc1-file.ksn.kaspersky-labs.com

• dc1-kas.ksn.kaspersky-labs.com

• dc1-st.ksn.kaspersky-labs.com

KPSN

TCP

443

Outbound

KPSN server

Moebius service

TCP

443

Outbound

Kaspersky servers

• moebius.kaspersky-labs.com

• moebius-new.kaspersky-labs.com

LDAP server connection

TCP

389

Outbound

Active Directory servers

Kerberos authentication in Active Directory

UDP, TCP

88

Outbound

Active Directory servers

NTLM authentication using the single sign-on technology

TCP

445 (can be changed in the application web interface)

Outbound

Active Directory servers

KATA protection

TCP

443 by default (can be changed in the application web interface)

Outbound

KATA server

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.