KASPERSKY LAB Kaspersky Anti-Virus for Firewall USER GUIDE
KASPERSKY ANTI-VIRUS FOR FIREWALL User Guide Kaspersky Lab Ltd. Tel. +7 095 797 87 00 • Fax +7 095 948 43 31 Visit our Web site: http://www.kaspersky.
Contents 1. KASPERSKY™ ANTI-VIRUS FOR FIREWALL ............................ 6 1.1. Function And Features ........................................... 6 1.2. KAV for Firewall: Protecting Local Network From Viruses .................................................................................. 8 1.3. What’s New… ........................................................... 9 1.4. Distribution Kit ......................................................... 9 1.5. Help Desk For Registered Users .................
5.4. Defining Setting For Each Protocol Separately ..57 6. ACTIONS TAKEN FOR INFECTED FILES .................................69 7. PERFORMANCE STATISTICS AND OPERATION LOG ................71 7.1. Displaying The Performance Statistics ...............71 7.2. Log File ....................................................................73 7.3. Alerts From Control Centre ...................................74 8. KASPERSKY ANTI-VIRUS FOR FIREWALL AGENT ...................76 8.1. General Information ...............
Dear Customer, Thank you for choosing KASPERSKY ANTI-VIRUS to protect your computer from viruses. The best anti-virus experts worked hard to make this product meet the highest possible standards and feel sure that you will find it efficient and effective. By choosing our software, you acquire the unbeatable protection against viruses. Our company always seeks to make the software products more friendly and easy-to-use while keeping their functionality at the highest possible level.
1 Chapter 1. Kaspersky™ Anti-Virus For Firewall What is Kaspersky Anti-Virus for Firewall? Distribution kit. 1.1. Function And Features Kaspersky™ Anti-Virus for Firewall is a special plug-in module for the centralised filtering of data traffic passing through firewalls supporting Content Vectoring Protocol (CVP). Kaspersky™ Anti-Virus for Firewall is based on the world's famous anti-virus kernel used in other Kaspersky Lab products.
K A S P E R S K Y A N T I - V I R U S that have been used to download them, i.e. SMTP, FTP and HTTP, checks for viruses and returns these to the firewall with the banner indicating the check results. To speed up the check procedure you can use different workstations to scan for viruses in different types of traffic (SMTP, FTP and HTTP).
K A V F O R F I R E W A L L Kaspersky™ Anti-Virus for Firewall is developed for Check Point Firewall-1, versions 3.0, 4.0, and 4.1. 1.2. KAV for Firewall: Protecting Local Network From Viruses Nowadays more and more large, medium or small companies provide their staff with access to the Internet. Consequently, the probability that one day a virus will pass from the Internet onto your private network increases every day.
K A S P E R S K Y A N T I - V I R U S Different servers require different approaches to their anti-virus protection. The HTTP server, for example, runs ActiveX and Java applets. These elements may contain viruses that must be deleted before they reach the browser. To protect email (SMTP) from viruses the anti-virus program must access each database and find any hidden viruses attached to messages before the recipient reads or readdresses this message.
K A V F O R F I R E W A L L • license agreement; • sealed envelope with CD containing the program installation files; • User Guide; • registration card. Before you unseal the envelope with CD make sure to review thoroughly the license agreement. 1.4.2. License agreement License Agreement is a legal agreement between you (either an individual or a single entity) and the manufacturer (Kaspersky Lab LTD) describing the terms on which you may employ this anti-virus product.
K A S P E R S K Y A N T I - V I R U S When registered you obtain the status of Kaspersky Lab legal customer and will be provided with the product support and antivirus database updates for the period of your subscription. Furthermore, Kaspersky Lab provides Kaspersky Anti-Virus registered users with information about the new products released by the company. 1.5.
K A V F O R F I R E W A L L 1.6. Information In The Book This book contains information on how to install, configure and manage the software product, explains its basic concepts and the way they can be applied, recommends how to manage and change settings.
2 Chapter 2. Installing KAV for Firewall Step-by-step installation. File *.KEY. 2.1.
I N S T A L L I N G K A V F O R F I R E W A L L KAV for Firewall is installed on any computer of your local network and works with Check Point Firewall-1 copies regardless of the operating system they are running under. To speed up the check procedure you can use different workstations to scan for viruses in different types of traffic (SMTP, FTP and HTTP). 2.2. Step-By-Step Installation 2.2.1. Installing the first time ) To install KAV for Firewall on a computer, follow the steps: 1.
K A S P E R S K Y A N T I - V I R U S 4. Read the wizard window information and click Next to proceed. The License Agreement wizard window will appear on your screen (see figure 2). Figure 2. The License Agreement wizard window 5. Review all the agreement terms. If they are acceptable click Yes to proceed. Click No to abort the installation if the terms are not acceptable. If you accepted the terms, the Customer Information wizard window will appear on your screen (see figure 3).
I N S T A L L I N G K A V F O R F I R E W A L L Figure 3. The Customer Information wizard window 6. Type in the required information in the User Name and the Company Name fields. Then click Next to proceed. The Choose Destination Location wizard window will appear on your screen (see figure 4). Figure 4.
K A S P E R S K Y A N T I - V I R U S 7. In this wizard window, you must choose a directory where your KAV for Firewall will be installed: • To do this, press the Browse button and select the required directory (see figure 5). • Then click OK. • In the Choose Folder wizard window on your screen, click Next to proceed. Figure 5. The Choose Folder wizard window 8. The Select Program Folder wizard window will appear on your screen (see figure 6).
I N S T A L L I N G K A V F O R F I R E W A L L Figure 6. The Select Program Folder wizard window 9. The Setup Type wizard window will appear on your screen (see figure 7). In this window, you must choose the type of installation you want the installation wizard to perform. The choices are: Figure 7.
K A S P E R S K Y A N T I - V I R U S • Custom — allows you to choose exactly which components to install; • Typical — installs all the program components. This option skips the steps 11 and 12 described below. 10. Click Next to proceed. 11. If you choose Custom in the Setup Type wizard window, the Select Components wizard window will appear on your screen (see figure 8). In this window, you must choose the required components. By default, all the components are selected.
I N S T A L L I N G K A V F O R F I R E W A L L 12. The Report Files Location wizard window will appear on your screen (see figure 9). In this window, you must select a directory where KAV for Firewall will place its log files. When done, click Next to proceed. Figure 9. The Report Files Location wizard window 13. The Start Copying Files wizard window will appear on your screen (see figure 10). Read the installation information and click Next to proceed.
K A S P E R S K Y A N T I - V I R U S Figure 10. The Start Copying Files wizard window Figure 11. The Setup status wizard window 14. When the wizard is done, the Configuration wizard window will appear on your screen (see figure 12).
I N S T A L L I N G K A V F O R F I R E W A L L the Local IP Address field on this wizard window, you must specify the local IP address of the computer where you installing the program, and in the CVP Port field — the required port number. If in order to work with the firewall the program needs additional authentication, you must check the Authentification box and specify the required port number in the Authentification CVP Port field. Then click Next to proceed.
K A S P E R S K Y A N T I - V I R U S Figure 13. The Temporary Files Location wizard window 16. The Key File wizard window will appear on your screen (see figure 14). In this window, you must define the key file and its location (see subchapter 2.3). If the file is located in the folder from which you are running the installation wizard, it will be automatically displayed in the List of key files to install list.
I N S T A L L I N G K A V F O R F I R E W A L L Figure 14. The Key File wizard window 17. When the installation procedure is completed the Completing the Kaspersky Anti-Virus for Firewall Setup Wizard wizard window will appear on your screen (see figure 15). Check the KAV components that you want to start immediately after the installation and press the Next button.
K A S P E R S K Y A N T I - V I R U S Figure 15. The Completing the Kaspersky Anti-Virus for Firewall Setup Wizard wizard window 2.2.2. Reinstalling the program If when started the installation wizard will detect a previous installation of the program on your computer, the Program Maintenance wizard window will appear on your screen (see figure 16). In this window, you must choose the re-installation type.
I N S T A L L I N G K A V F O R F I R E W A L L Figure 16. The Program Maintenance wizard window If you selected the Modify option, the Select Components wizard window will appear on your screen (see figure 17). In this window, you must check boxes of the components that you want to add to the previous installation. When done, click Next to proceed.
K A S P E R S K Y A N T I - V I R U S Figure 17. The Select Components wizard window If you selected the Repair option on the Program Maintenance wizard window, the Confirm File Repair wizard box will appear on your screen (see figure 18). Press the OK button to confirm or the Cancel button to cancel the reinstallation. Figure 18. The Confirm File Repair wizard box 2.2.3.
I N S T A L L I N G K A V F O R F I R E W A L L The confirm un-installation wizard box will appear on your screen. To initiate the removal operation, click OK. The installation wizard will erase the program files from your computer. If while uninstalling the wizard detected a KAV file that might be used by some other programs on your computer, the file-removal confirmation box appears on your screen. To erase the file, press the Yes button. 2.3. The *.KEY File The *.
3 Chapter 3. Preparing To Run The Program Configuring your CheckPoint firewall to work with KAV for Firewall 3.1. Binding Firewall With KAV For Firewall To ensure the co-operation between KAV for Firewall and the firewall program, the latter should be appropriately configured. 3.2. Adding CVP Server First, you need to create the CVP server. ) To add the CVP server follow the steps: 1. Select Servers from the Manage menu of your firewall program.
P R E P A R I N G T O R U N T H E P R O G R A M 2. Press the New button and select CVP from the drop down list (see figure 20). 3. For the server to operate correctly you must define it. Use the CVP Server Properties dialog Name text field to name the new server (see figure 21). It’s advisable for the name to indicate the server functional load, so that to make it easy for your colleagues to identify it in your absence. Select the computer running KAV for Firewall from the Host drop down list.
K A S P E R S K Y A N T I - V I R U S Figure 20.
P R E P A R I N G T O R U N T H E P R O G R A M Figure 21. The CVP Servers Properties dialog box Figure 22.
K A S P E R S K Y A N T I - V I R U S 3.3. Adding Resources KAV for Firewall is able to monitor data traffic passing through the protocols: HTTP, SMTP and FTP. If you wish, you can enable the program to check for viruses in all of these three traffic types. 3.3.1. Adding the HTTP resource ) To add the HTTP resource, follow the steps: 1. Select Resources from the Manage menu of your firewall to display the Resources dialog box. (see figure 23). 2. In the Resources dialog box, press the New button.
P R E P A R I N G T O R U N T H E P R O G R A M read and disinfect the data-packets it receives (see figure 27). It’s advisable that you select the Read/Write option button. Click OK. If any problem of routing the data is detected (some data was not received or could not be sent) and you suspect your KAV for Firewall is the reason, you can check it. To do this, select the None option button as an action of your KAV server for all the protocols.
K A S P E R S K Y A N T I - V I R U S Figure 24. Adding the HTTP recourse Figure 25.
P R E P A R I N G T O R U N T H E P R O G R A M Figure 26. The URL Definition dialog box: The Match page Figure 27.
K A S P E R S K Y 3.3.2. A N T I - V I R U S Adding the SMTP resource ) To add the SMTP resource, follow the steps: 1. Select Resources from the Manage menu of your firewall to display the Resources dialog box. (see figure 28). 2. In the Resources dialog box, press the New button and select SMTP from the drop down list. Type a name of the resource (e.g. KAV_SMTP)in the Name text field on the SMTP Definition dialog box General page (see figure 29). 3.
P R E P A R I N G T O R U N T H E P R O G R A M Figure 28. The Resources dialog box Figure 29.
K A S P E R S K Y A N T I - V I R U S Figure 30. The SMTP Definition dialog box: The Match page Figure 31.
P R E P A R I N G T O R U N T H E P R O G R A M Figure 32. The SMTP Definition dialog box: The Action2 page 3.3.3. Adding the FTP resource ) To add the FTP resource, follow the steps: 1. Select Resources from the Manage menu of your firewall to display the Resources dialog box. (see figure 33). 2. In the Resources dialog box, press the New button and select FTP from the drop down list. Type a name of the resource (e.g.
K A S P E R S K Y A N T I - V I R U S Figure 33. The Resources dialog box Figure 34.
P R E P A R I N G T O R U N T H E P R O G R A M Figure 35. The FTP Definition dialog box: The Match page Figure 36.
K A S P E R S K Y A N T I - V I R U S Figure 37. The Resources dialog box: Check the changes you made 3.4. Creating Rules In order for the added resources to affect the data traffic you (the local network administrator) must add new or edit existing rules for the firewall. Below we will discuss examples of creating three rules for different protocols (FTP, HTTP, SMTP). To create a new rule you must click on an existing rule number with your mouse right button.
P R E P A R I N G T O R U N T H E P R O G R A M Figure 38. Adding new rule To add the resource you created (see subchapters 3.3.1, 3.3.2, 3.3.3) to the existing rule you must click on the Service cell of the rule with your mouse right button and select Add With Resource from the right-click menu that appeared in your screen. Figure 39. Adding a resource to the existing rule The Service with Resource dialog box will appear on your screen.
K A S P E R S K Y A N T I - V I R U S Figure 40. The Service with Resource dialog box After you added the resource to the rule, you must inform the firewall how to handle the data packets passing through the resource protocol. To do this, click on the Action cell of the rule with your mouse right button. If you want the data packets that were checked for viruses (and disinfected) by your KAV for Firewall to proceed to their recipients select Accept from the right click menu that appeared in your screen.
P R E P A R I N G T O R U N T H E P R O G R A M Figure 41. Selecting the action The same way you can create rules for other protocols. Figure 42.
K A S P E R S K Y A N T I - V I R U S Figure 43. Adding the SMTP resource to the rule Review the firewall window for the changes, you made. Figure 44. Review the changes you made 3.5. Saving New Settings Now in order to apply the settings you defined, you must save these. To do this, select Install from the Policy menu of your firewall.
4 Chapter 4. Running The Program How you can launch KAV for Firewall. Command line switches. 4.1. Various Methods To Launch The Program 4.1.1. …from the Windows Program menu You can launch KAV for Firewall from the Windows Program menu Kaspersky Anti-Virus for Firewall group, that have been created during the installation. ) To launch your KAV for Firewall from the Windows Program menu, follow the steps: 1. Click the Start button, and point to Programs. 2. Point to KAV for Firewall. 3.
K A S P E R S K Y A N T I - V I R U S ) To stop your KAV for Firewall from the Windows Program menu, follow the steps: 1. Click the Start button and point to Programs. 2. Point to KAV for Firewall. 3. Then point and click Stop KAV for Firewall. 4.1.2. … from the command line. Using the switches You can start your KAV for Firewall from the command line where options are selected by means of command line switches.
R U N N I N G T H E P R O G R A M /STOP — stops KAV for Firewall by interrupting current checking operations . /CONFIG[=filename] — reloads the configuration file. If you want to load new settings from a configuration file other then the default one, specify its name with the switch. /RELOAD — reloads virus-definition databases. /STAT — displays your KAV for Firewall performance statistics. /RESET — refreshes your KAV for Firewall performance statistics.
5 Chapter 5. Configuring The Program The KAV for Firewall settings. Defining anti-virus settings. Settings for various protocols. 5.1. Anti-Virus Settings If you want to change operational characteristics of your KAV for Firewall, you can configure it, i.e. define the objects that must be checked, actions that must be taken, extra scanning tools that must be used and etc. You can configure the program using your Control Centre or by editing the configuration file kawall.cfg.
C O N F I G U R I N G T H E P R O G R A M configuration file by defining its name in the /CONFIG command line switch. For example, KAWALL/CONFIG[=], where is a name of the configuration file to be loaded. 5.2. Various Configuration Methods 5.2.1. … from your Control Centre ) To display the KAV for Firewall dialog window from your Control Centre, so that to change the program settings, follow the steps: 1. In the Control Centre main window, switch to the Tasks tab. 2.
K A S P E R S K Y A N T I - V I R U S kapwall.cfg is a conventional text file (ASCII format). It contains several sections listing parameters and the values. The general format of such section is: [Section_title] Parameter_name=Parameter_value Parameter_name=Parameter_value ... The first string of a section introduces its title enclosed with square brackets. The other strings introduce parameters and their values. Each string contains a parameter name, an equals sign and the required value.
C O N F I G U R I N G T H E P R O G R A M 5.3. Defining General Anti-Virus Settings . Figure 45. Settings tree: The Globals branch 5.3.1. Enabling/disabling the check mode If you uncheck the Globals box, your KAV for Firewall will be disabled to check for viruses in the data passing through the firewall. This check box corresponds to the Enable parameter of the [Commons] section in kapwall.cfg (see subchapter 5.2.2).
K A S P E R S K Y 5.3.2. A N T I - V I R U S The file describing your virusdefinition databases In the Set file text field you must define the name and the location of a file containing description of your virus-definition databases. By default the virus-definition database file that have been installed on your computer together with the KAV for Firewall is specified in this field (see subchapter 2.2). This field corresponds to the DatabasesSetFile parameter of the [Commons] section in kapwall.
C O N F I G U R I N G T H E P R O G R A M ) To limit the size of your log file, follow the steps: 1. Check the Limit size box. 2. Define the maximum size of your log file (in Kb) in the text field. If you check the Append box, KAV for Firewall will add each new report to the file’s existing contents. If the box is not checked, only the most recent check report will be available. These options correspond to parameters of the [LogFile] section in kapwall.cfg (see subchapter 5.2.2). 5.3.5.
K A S P E R S K Y A N T I - V I R U S LimitSizeKB — contains the maximum size of your log file (see subchapter 5.3.4). Append — appends to/substitutes the log file contents by the new report. Available values: Yes or No (see subchapter 5.3.4). 5.4. Defining Setting For Each Protocol Separately KAV for Firewall allows to change settings for every type of traffic separately.
C O N F I G U R I N G 5.4.1. T H E P R O G R A M Enabling/disabling the HTTP check mode ) To enable KAV for Firewall to check for viruses in objects passing through the firewall by HTTP, you must check the HTTP box. This check box corresponds to the Enable parameter of the [HTTP Scan] section in kapwall.cfg (see subchapter 5.2.2). 5.4.2. Objects to be checked To define the objects to be checked for viruses you must use options of the Objects branch.
K A S P E R S K Y A N T I - V I R U S 2. Define the required file masks or file names in the below text field. The Compound files list of check boxes allows you to check for viruses in complex objects, i.e. the files containing graphics, databases and data from other applications.
C O N F I G U R I N G • T H E P R O G R A M JSMail SMTP/POP3 server (user database). Besides, you can limit the size of complex objects that will be checked for viruses. ) To do this, follow the steps: 1. Check the Limit size box. 2. Define the maximum size of a complex file (in Kb) to be checked for viruses in the below text field. These options correspond to the following parameters of the [HTTP Scan] section in kapwall.
K A S P E R S K Y A N T I - V I R U S ) To enable KAV for Firewall to attempt curing infected files you must check the Try to cure check box. If you want the program to copy any infected files it finds to a separate folder on your hard drive check the Copy to check box and define the corresponding directory in the below text field. To limit the size of the files that can be saved on your hard drive, check the Limit size check box and define their maximum and minimum sizes in the below text fields.
C O N F I G U R I N G T H E P R O G R A M Figure 47. The Actions branch The same way you can define actions for suspicious (the Suspicious branch) and non-scanned objects (the Non-scanned branch) the only difference is that these objects cannot be disinfected by KAV for Firewall. Non-scanned objects are the objects that your KAV for Firewall, by some reasons, could not check for viruses (e.g., passworded archives).
K A S P E R S K Y 5.4.4. A N T I - V I R U S Extra scanning tools The Options branch of the settings tree allows you to enable/disable extra scanning tools that might be used by your KAV for Firewall (see figure 48). Figure 48. The Options branch 5.4.4.1. Heuristic tool To enable the heuristic detection tool you must check the Code Analyzer box.
C O N F I G U R I N G T H E P R O G R A M Code Analyzer checks file codes searching for virus-similar instructions. If the instructions (such as - to open a file, to write into it, to intercept the interrupt vectors or etc.) are detected the file is suspicious and the program generates the appropriate record in the log file. This check box corresponds to the CodeAnalyser parameter of the [HTTP Scan] section in kapwall.cfg (see subchapter 5.2.2) 5.4.4.2.
K A S P E R S K Y A N T I - V I R U S 5.4.4.4. Holding settings One of the most important features of this new version of KAV for Firewall is that it allows to define holding settings for the examined files. The point is that, quite often users failed to download files of a large size. It happened because KAV for Firewall took a lot of time checking for viruses in those files, and remote computers automatically suspended operations after a specified time-out interval.
C O N F I G U R I N G T H E P R O G R A M 0 — corresponds to the All files option button; 1 — corresponds to the User defined option button. UserDefined — contains file masks that will be checked by KAV for Firewall. Effective only if the above parameter value is 1 (see subchapter 5.4.2). ExcludeMask — allows you to exclude some file masks from the check. Available values: Yes or No (see subchapter 5.4.2). ExcludeDefined — contains file masks that will be ignored by KAV for Firewall.
K A S P E R S K Y A N T I - V I R U S InfectedCopyTo — enables/disables the program to copy infected files to a separate folder. Available values are Yes or No. InfectedFolder — contains the pathname of the corresponding folder. Effective only if the above parameter value is Yes. InfectedCopyLimitSize, InfectedCopyLimitMinSizeKB and InfectedCopyLimitMaxSizeKB - allow you to limit the size of infected files to be copied to the folder and to define their max. and min. sizes in Kb.
C O N F I G U R I N G T H E P R O G R A M HoldTimeSEC — contains the maximum time during which the program is allowed to hold an object. HoldFilePER — contains the maximum percentage of the object size that can be held by KAV for Firewall (see subchapter 5.4.4.4).
6 Chapter 6. Actions Taken For Infected Files Actions that are taken by your KAV for Firewall when it detected a virus in the data traffic for various protocols. When KAV for Firewall detects infected files, it captures and holds a share of each of those files (the share that is held by the program is measured in percentage from the entire size of the file and must be defined for every protocol separately (see subchapter 5.4.4.4)) .
П Р О С М О Т Р Р Е З У Л Ь Т А Т О В П Р О В Е Р К И Д И С К О В • The HTTP and the FTP traffics do not allow the program to capture and hold 100% of the examined file. If the user will try to download an infected file via one of these protocols, he(she) will receive only a share of the file.
7 Chapter 7. Performance Statistics And Operation Log Information and performance statistics of your KAV for Firewall. How to view the reports. 7.1. Displaying The Performance Statistics At any time, you can use your KAV Control Centre to review the KAV for Firewall performance statistics and its status. ) To display the KAV for Firewall performance statistics, follow the steps:, 1. In the KAV Control Centre main window, switch to the Tasks tab. 2.
P E R F O R M A N C E S T A T I S T I C S A N D O P E R A T I O N L O G In the right frame of this page you will see the task performance statistics (see figure 50). Here you can review the statistics for every protocol separately. Figure 49. The KAV for Firewall performance statistics The on-line viewing of the statistics and current status of your KAV for Firewall makes it simple to analyse and compare check reports and allows before-the-fact prevention of the infection.
K A S P E R S K Y A N T I - V I R U S 2. Select the task created for your KAV for Firewall from the list, by clicking on it with your mouse. 3. Click your mouse right button and select View Report from the right click menu. The Report Viewer contains a table with information about the date and the time when the check was performed, the object checked and the result of this check. Figure 50. The example log Besides, to review the operation log you can use the appropriate command line switch.
P E R F O R M A N C E S T A T I S T I C S A N D O P E R A T I O N L O G 7.3. Alerts From Control Centre If in the Properties dialog window you switch to the Alerts tab, you will see the list alerts that the program generates at alarm conditions (see figure 51). If your KAV Control Centre operates as a part of the KAV Network Control Centre, these alerts can be emailed to your network administrator.
K A S P E R S K Y A N T I - V I R U S To do this, you simply have to check/uncheck the corresponding check box. For information about how to define destination addresses for your alerts refer to the KAV Control Centre documentation. The alert message subject line contains a name of the workstation, a name of the component that generated this alert and the message itself. The sender field contains an address of the server.
8 Chapter 8. Kaspersky Anti-Virus for Firewall Agent Kaspersky Anti-Virus for Firewall Agent. 8.1. General Information Kaspersky Anti-Virus for Firewall Agent is a program that is included in the KAV for Firewall distribution kit and developed to automatically monitor the performance of KAV for Firewall and to launch the appropriate support program in case of the KAV for Firewall failure (or it can restart the KAV for Firewall). 8.2.
K A S P E R S K Y A N T I - V I R U S RunOnStop=Yes RunOnStopProgram= 77
Appendix A. Kaspersky Lab Ltd. Kaspersky Lab Ltd. is an international, privately owned softwaredevelopment company based in Moscow, with representative offices in Cambridge (United Kingdom), Walnut Creek (United States), and Johannesburg (South Africa). The company was founded in 1997, and concentrates its efforts on development, marketing and distribution of the world-class data-security technologies and related computer software.
K A S P E R S K Y A N T I - V I R U S applications. It provides strong anti-virus defence for mail gateways (MS Exchange Server, Lotus Notes/ Domino, Sendmail, Qmail, and Postfix), firewalls and WEB servers. All Kaspersky Anti-Virus products rely on Kaspersky's own database of over 55,000 known viruses and types of malicious code.
Appendix B. Frequently Asked Questions Question: It seems that KAWALL performance is correct. But when I try opening a page in my Internet Explorer, the page is not loading. However, when I do it with Netscape, everything is ok. Why does it happen? Answer: This problem is not related to your KAWALL, it concerns your HTTP security server. It is possible that your server does not support HTTP1.1 and does not open the pages. Some authors recommend to add a certain code to the $FWDIR/conf/objects.
K A S P E R S K Y A N T I - V I R U S Question: Firewall-1 generates a lot of records about the authentication between KAWALL and Firewall-1 in its logs. How can I suppress these records? Answer: It happens because by default the firewall modules expect the authentication data from the CVP server. You can edit the $FWDIR/conf/fwopsec.conf firewall file Delete the following string from this file: server 18181 AUTH_OPSEC Then restart the firewall.
K A S P E R S K Y L A B L T D . The new version of KAWALL provides this option. And now the user can define it him(her)self. Parameters=>HTTP (SMTP/FTP)=>Options=> Hold=>Percent. Or in the configuration file kawall.cfg (the HoldFilePER= parameter). Question: After the installation of KAWall the messages are coming in without attachments (the attachments are cut off).
K A S P E R S K Y A N T I - V I R U S Question: What data I must provide when contacting the technical support service? Answer: If you have a problem and would like to contact our technical support service, you must describe the problem and provide the following information: 1. Version of your Firewall Check Point. 2. What SPs for Firewall Check Point are installed on your computer?. 3. How many computers working through your Firewall Check Point? 4. Version of your KAWALL.