Kaspersky Web Traffic Security 6.1 Guide
Kaspersky Web Traffic Security 6.1 Guide
Security 6.1
Proof of Concept guide
Kaspersky
26.03.2020
Contents
Introduction ................................................................................................................................................................... 2
Who should use this guide? ...................................................................................................................................... 2
What is Kaspersky Web Traffic Security? ................................................................................................................. 2
What's new ................................................................................................................................................................ 3
Application architecture ............................................................................................................................................. 4
Prepare the environment .............................................................................................................................................. 6
Review KWTS requirements ..................................................................................................................................... 6
Download the required files ....................................................................................................................................... 6
Configure network ..................................................................................................................................................... 6
Demo environment description.................................................................................................................................. 6
Deployment and configuration ...................................................................................................................................... 8
Deploy KWTS ............................................................................................................................................................ 8
Activate KWTS ........................................................................................................................................................ 20
Enable KSN (optional) ............................................................................................................................................. 22
Configure LDAP integration..................................................................................................................................... 23
Configure built-in proxy server authentication ......................................................................................................... 26
Configure Single Sign-On (SSO) ............................................................................................................................ 27
Capability scenarios.................................................................................................................................................... 31
Web protection ........................................................................................................................................................ 31
Web control ............................................................................................................................................................. 32
SSL decryption ........................................................................................................................................................ 34
Role Based Access Control (RBAC) ....................................................................................................................... 37
Cluster mode ........................................................................................................................................................... 39
Appendix A: HAProxy configuration file for the HTTP load balancing ....................................................................... 50
Appendix B: PoC completion checklist ....................................................................................................................... 51
Introduction
Who should use this guide?
This guide is built to help you quickly deploy and configure Kaspersky Web Traffic Security 6.1 (KWTS) for
evaluation. It guides you through detailed scenarios in a proof of concept environment to help you better
understand how KWTS works. These instructions provide an evaluation method for the most common KWTS use
cases.
The guide is intended for use primarily by KL’s presales engineers and 3rd parties wishing to evaluate the product.
1. Have a prior knowledge of Internet access management and corporate network infrastructure.
The application protects users of a corporate network when accessing web resources. For example, it deletes
malware and other threats from the data stream that enters the corporate network via the HTTP(S) and FTP
protocols, blocks infected and phishing websites, and controls access to web resources based on web resource
categories and content types.
• Protects the IT infrastructure of your organization from most modern malware and encrypting ransomware
thanks to machine-learning algorithms and operating system data emulation technology.
• Uses Kaspersky Security Network data to obtain information about the reputation of files and web
resources, ensure that Kaspersky Lab applications react to threats faster without waiting for an application
database update, and reduce the likelihood of false positives.
• Integrates with Kaspersky Private Security Network (hereinafter also referred to as KPSN) to access
reputation databases of Kaspersky Security Network and other statistical data without sending data from
their computers to Kaspersky Security Network.
• Scans encrypted traffic with certificate replacement on the proxy server side.
• Performs content filtering of incoming and outgoing files based on the URL, file name, MIME type, size,
type of source file (the application can determine the true format and type of the file, regardless of its
extension), and checksum (MD5 or SHA256).
• Lets you restrict access to various categories of web resources (hereinafter also referred to as "web
categories"), for example: Gambling, lotteries, sweepstakes; Adult content; Internet for children; Prohibited
by laws of the Russian Federation.
• Lets you configure application settings and manage the application through the web interface.
• Lets you monitor the application status, the web traffic processed by the application, the number of
scanned and detected objects, most recent threats, blocked users and URLs in the application web
interface.
• Lets you create workspaces for configuring individual rules for processing traffic of departments of
organizations or managed organizations (for Internet service providers).
• Lets you configure access permissions of administrators for working with managed organizations.
• Lets you investigate incidents involving Internet access by searching and viewing events.
• Adjusts traffic processing conditions in cases when traffic processing does not match the defined rules.
• Updates application databases from Kaspersky Lab update servers or custom resources (HTTP servers,
shared network folders) according to schedule or on demand.
• Integrates with Microsoft Active Directory to assign roles and manage access and protection rules.
Supports NTLM- and Kerberos authentication in Active Directory for access to the web interface.
• Publishes application events to a SIEM system that is already in use in your organization over the Syslog
protocol. Information about each event is sent to a separate syslog message.
• Lets you deploy an ISO image of an operating system with the pre-installed application (including the proxy
server).
• Lets you configure proxy server settings through the application web interface (when using an ISO image).
What's new
Kaspersky Web Traffic Security 6.1 has the following new features:
o Rpm/deb package.
o ISO image of an operating system with the pre-installed application (including the proxy server).
• Proxy server settings can now be managed through the application web interface (only for ISO image
installation.
o The separation of Worker server and Master server roles has been discontinued.
o Components for managing application settings and processing traffic are combined into a single
package.
o Send files from user traffic to KATA (connect KWTS as an external KATA system).
o Receive information about objects detected by KATA (use information about KATA detections in traffic
processing rules).
• You can now configure the time zone and time synchronization of the server over the NTP protocol (only
for ISO image deployment).
Application architecture
Depending on the distribution kit the application architecture may differ slightly. Since in this guide KWTS is used
as an appliance with the built-in proxy server, then the KWTS architecture is as follows.
The numbering in the figure corresponds to the following steps of traffic processing:
1. A user requests access to a web resource. This request is relayed to the server that has the application
installed.
2. The built-in proxy server accepts the request and relays it to the application's ICAP server so that it can be
scanned according to the traffic processing rules.
3. If access to the web resource is allowed according to the scan results, the built-in proxy server sends the
request to this web server on the Internet.
4. The web server hosting the requested web resource sends a response to the built-in proxy server.
5. The built-in proxy server sends the web server response to the application's ICAP server so that the
response can be scanned according to the traffic processing rules. The scan result is returned to the built-
in proxy server.
6. The built-in proxy server sends the response to the user's computer. Depending on the actions defined in
the application, the user may see the following pages:
a. If access to the web resource is allowed, the requested web page is displayed.
c. If the Redirect action was applied, the user sees the web page to which the redirect was
configured.
If traffic processing requires two or more servers with the application installed, all servers are combined into a
cluster. One of the servers in the cluster should be assigned the Control node. The other servers in the cluster will
be assigned the Secondary node role. The difference between a Control node and Secondary nodes is that
application settings can be modified on the node with role Control. They are distributed from the node with role
Control to all nodes with role Secondary in the cluster. Then each cluster node exchanges data with the Active
Directory server independently.
You can find more information about the application architecture operation algorithms in Online help.
Prepare the environment
Review KWTS requirements
You can find the list of all requirements for KWTS 6.1 in the dedicated article in Online help.
• ISO: kwts-6.1.0-4762-inst.x86_64_mlg.iso.
Configure network
If you installed the application from an RPM or DEB package, to ensure correct operation of Kaspersky Web Traffic
Security you must first configure the ports on servers that have the application installed and on corporate LAN
routers used for relaying traffic. If you deployed the application from an ISO image, all the ports required for
operation are already configured.
For the application deployed from the RPM or DEB package please open the ports from the following article:
https://help.kaspersky.com/KWTS/6.1/en-US/189764.htm.
FQDN OS IP Purpose
Windows Server Domain Controller with the DNS
wins2019s.demo.lab 10.0.0.1
2019 Standard role.
Account Purpose
[email protected] Domain administrator + KWTS administrator.
In order to install Kaspersky Web Traffic Security for demo (Proof of Concept) purposes, it is necessary to upload
an ISO file to virtual data storage of the hypervisor and create an empty virtual machine with the following
parameters:
• CPU: 8 (minimum 4)
• RAM: 8GB
• HDD: 200GB.
For a production environment use the parameters from the hardware and software requirements. Instructions how
to create and prepare a VM for the KWTS installation:
Mount an ISO disk mage to the created VM and run this VM.
After completing this step, you have successfully installed Kaspersky Web Traffic Security.
Activate KWTS
After completing this step you have successfully activated Kaspersky Web Traffic Security.
Kaspersky Security Network (hereinafter also referred to as KSN) is an infrastructure of cloud services providing
access to the Kaspersky Lab online knowledge base containing information about the reputation of files, web
resources, and software. The use of data from Kaspersky Security Network ensures faster responses by
Kaspersky Web Traffic Security to objects that are not yet listed in anti-virus application databases, improves the
performance of some protection components, and reduces the likelihood of false positives.
• If you accept the terms and conditions, select the I agree to participate in KSN check box.
• If you do not accept the terms and conditions, clear the I agree to participate in KSN check box.
If you want to participate in Kaspersky Security Network and agree to submit statistics of your usage of
Kaspersky Security Network to Kaspersky Lab, select the Send KSN statistics to improve the threat
detection rate check box.
If you choose to participate in Kaspersky Security Network and agree to submit statistics of your usage of
Kaspersky Security Network to Kaspersky Lab, in the Additional KSN Statement section, read the
Supplementary Kaspersky Security Network Statement and do the following:
• If you accept the terms and conditions, select the I agree to send KSN statistics check box.
• If you do not accept the terms and conditions, clear the I agree to send KSN statistics check box.
Click Save.
After completing this step you have successfully configured participartion in KSN.
1. Check the status of the avahi-daemon service. To do so, execute the command:
systemctl status avahi-daemon
Before proceeding to the LDAP integration make sure that the KWTS time does not differ from your LDAP
server.
You can read more information about the ktpass utility by this link.
Transfer this keytab file to a place accessible from the computer where you run the KWTS Web Console.
Click Add.
After completing this step you have successfully configured LDAP integration.
After completing this step you have successfully configured a user authentication on the KWTS built-in proxy
server.
Go to Settings – Application
access – Single Sign-On login
and in the right pane under the
Kerberos authentication section
enable the Use Kerberos option.
In the Keytab file field specify the
the keytab file created during the
Configure LDAP integration step.
It is necesarry to add the KWTS Web Console address to the Local Intranet zone of your browsers. For Google
Chrome, Microsoft Edge and Internet Explorer do the following:
After completing this step you have successfully configured Single Sign-On.
Capability scenarios
Web protection
In this scenario we will demonstrate that KWTS can protect against web threats.
Evaluation steps:
Open a web browser and connect to the KWTS Web Console. Enter your credentials if SSO is not configured.
Go to Settings – General –
Default protection policy.
Go to
http://www.eicar.org/download/eicar.com
Go to
http://www.kaspersky.com/test/aphish_h
and make sure has been blocked by
KWTS.
Switch to the KWTS Web Console.
After completing this scenario you know that KWTS can protect against web threats.
Web control
In this scenario we will demonstrate that using KWTS you can configure users’ access to the Internet.
Evaluation steps:
1. Configure an access rule to block social networks for a certain user’s group.
2. Check if the social networks are blocked for the user’s group.
Open a web browser and connect to the KWTS Web Console. Enter your credentials if SSO is not configured.
Note that user’s primary Active Directory group (usually Domain Users) cannot be used as value for LDAP
group canonical name.
After completing this scenario you know that using KWTS you can configure users’ access to the Internet.
SSL decryption
In this scenario we will demonstrate how to configure KWTS in order to decrypt SSL/TLS connections.
Evaluation steps:
Expected result: KWTS will block test malicious link and show a block page.
Open a web browser and connect to the KWTS Web Console. Enter your credentials if SSO is not configured.
Now it is necessary to add this certificate in the Trusted Root Certification Authorities store on every computer,
which will be used to access the Internet. If the domain infrastructure is used, then it can be done via Group
Policies (alternative link).
The Mozilla Firefox browser uses its own certificate storage. For details about importing a certificate to
the Mozilla Firefox storage, please refer to the instructions by the following link.
If the domain infrastructure is not used, then it is necessary to install this certificate to the Trusted Root
Certification Authorities store on every computer manually.
Switch to a domain workstation, run cmd and in the command line execute the following command:
gpupdate /force
1 You can find the information how to specify the common name by this and this links.
Switch back to the KWTS Web
Console.
Select the Settings → Built-in
proxy server → SSL section.
In the right pane in the Default
action field select Bump and
switch on the TLS/SSL connections
decryption.
Click Save.
During processing of HTTPS traffic, the result of application of the Block and Redirect actions differs from the
result of application of these actions to HTTP traffic. The user will not see a block page and will not be redirected to
the specified URL. Instead, the connection is terminated.
In order for the Block and Redirect to be applied correctly, you need to enable decryption of TLS/SSL connections
and add the CONNECT method to exclusions or create a bypass rule for it. If there are no traffic processing rules
that allow CONNECT requests, the connection will be terminated.
In this guide, we will create an exclusion for the CONNECT method in an access rule.
Go to Rules – Access.
Select a rule created during the
Web control demonstration and
click Edit.
Sign in as a user who is a member of the group specified in the access rule on the previous step. If you did not
perform the Step 2, then you can perform the following actions with any user account.
Try access www.google.com .
Make sure the certificate is valid,
issued by the domain name of the
server for which the certificate was
generated and there are no
warnings.
After completing this scenario you know that using KWTS you can scan encrypted connections.
Evaluation steps:
2. Make sure that this user can only view the settings.
Expected result: the domain user can only view the dashboard, application settings etc.
Go to Users.
You may also create your own roles with the detailed configuration of permissions. To do that click Add in the
Roles section, then specify a role name and assign necessary permission to the role.
Step 2. Make sure that this user can only view the settings
Go to Settings – General –
Protection settings and make
sure that you cannot edit the
parameters.
After completing this scenario you know that using KWTS you can configure RBAC.
Cluster mode
Kaspersky Web Traffic Security 6.1 has the cluster mode support. Using this mode, you can centrally manage all
the nodes within the cluster, access events from all cluster nodes from one place and configure fault tolerance if a
load balancer is used2.
In this scenario we will demonstrate that you can configure KWTS in the cluster mode with load balancing.
Evaluation steps:
3. Power off the KWTS control node and check the Internet access.
Expected result: Internet access will not be disrupted and all protection settings will be synchronized with the
secondary node.
2 You can read more about application operation with load balancing in Online Help.
Check the entered values and the
certificate fingerprint and click
Confirm.
Go to Settings – Application
Access – Single Sign-On login. In
the Kerberos authentication
section replace the old keytab file
with the new one.
Click Save.
Click Save.
After completing this step you already configured the KWTS cluster mode. All the settings are synchronized,
centralized management and access to events is configured.
At this step we will configure load balancing for KWTS. All the steps will be performedon Ubuntu 18.04. If you
use another Linux distribution3, please refer to the documentation of this distribution.
3 You can find the instructions for other Linux distribution if you use a deb/rpm KWTS package at Online Help.
Connect to the domain controller and
open DNS Manager (Server
Manager – Tools - DNS).
In this guide we will configure HAProxy in the TCP mode for demo purposes with basic configuration, but you
can also configure the HTTP mode.
Open the HAProxy configuration file with a text editor, e.g. Nano by executing the following command:
nano /etc/haproxy/haproxy.cfg
Do not change existing lines. Just add the following lines to the configuration file and save it 4:
frontend haproxynode
bind *:3128
mode tcp
default_backend backendnodes
backend backendnodes
balance <balancing method>
server <KWTS FQDN> <IP:Port> check send-proxy
server <KWTS2 FQDN> <IP:Port> check send-proxy
And the optional lines if you want to view the HAProxy statistics via web:
listen stats
bind :32700
stats enable
stats uri /
stats hide-version
stats auth administrator:Pa$$w0rd
frontend haproxynode
bind *:3128
mode tcp
default_backend backendnodes
backend backendnodes
balance roundrobin
server kwts.demo.lab 10.0.0.3:3128 check send-proxy
server kwts2.demo.lab 10.0.0.4:3128 check send-proxy
listen stats
bind :32700
stats enable
stats uri /
stats hide-version
stats auth administrator:Pa$$w0rd
Click Save.
After completing this step HAProxy will perform load balancing of the requests to KWTS between 2 KWTS
instances.
Step 3. Power off the KWTS control node and check the Internet access
Try to access
https://www.facebook.com/ and
https://www.vk.com . Make sure
they’re blocked.
Also, you can check events in the
KWTS Web Console.
Power on the KWTS Control node and connect to its Web Console.
Go to Events and add the additional
condition:
Action is equal to Block.
After completing this scenario you know KWTS can be used in the cluster mode with load balancing for
centralized administration, centralized access to events and for fault tolerance.
Appendix A: HAProxy configuration file for the HTTP load
balancing
Minimum configuration for the HTTP load balancing:
bind *:80
mode http
default_backend backendnodes
backend backendnodes
option forwardfor
1.2 Download the required files All required files are downloaded.
3 Capability scenarios
Role Based Access Control Domain user cannot edit the application
3.4
(RBAC) settings.