Kaspersky Security for Virtualization 6.2 Light Agent

Configuring the use of secure cryptographic algorithms, ciphers, and protocols

If you are using a Windows-based Integration Server, to ensure the security of network connections between the Integration Server and the virtual infrastructure, we recommend configuring encryption algorithms, ciphers, and protocols listed in this section. If you are using a Linux-based Integration Server, you do not need to configure network connection security.

On devices that host the Integration Server and virtual infrastructure objects to which the Integration Server connects, we recommend using the following encryption algorithms, cipher suites, and protocols:

  • Encryption algorithms: AES 256.
  • Hashing algorithms:
    • SHA256.
    • SHA384.
    • SHA512.
  • Key exchange algorithms:
    • Diffie-Hellman (ServerMinKeyBitLength=2048, ClientMinKeyBitLength=2048).
    • ECDH (key length at least 256, recommended elliptic curves: prime256v1, secp384r1, secp521r1, x25519).
  • Protocols:
    • TLS 1.2.
    • TLS 1.3.
  • Cipher suites:
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384.
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256.
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384.
    • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256.
    • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256.
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384.
    • TLS_AES_128_GCM_SHA256.
    • TLS_AES_256_GCM_SHA384.
    • TLS_CHACHA20_POLY1305_SHA256.
    • TLS_AES_128_CCM_SHA256.

If you do not have the latest versions of operating systems and hypervisors installed, problems may occur in the Integration Server's interactions with the virtual infrastructure due to incompatible cipher suites. In this case, we recommend to contact Technical Support.