Cisco ASA Series Cli Configuration Manual page 1529

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Configuring the ASA CSC Module
This chapter describes how to configure the Content Security and Control (CSC) application that is
installed in a CSC SSM in the ASA.
This chapter includes the following sections:
Information About the CSC SSM
Some ASA models support the CSC SSM, which runs Content Security and Control software. The CSC
SSM provides protection against viruses, spyware, spam, and other unwanted traffic by scanning the
FTP, HTTP/HTTPS, POP3, and SMTP packets that you configure the ASA to send to it.
For more information about the CSC SSM, see the following URL:
http://www.cisco.com/en/US/products/ps6823/index.html
Figure 1-1
In this example, the client could be a network user who is accessing a website, downloading files from
an FTP server, or retrieving mail from a POP3 server. SMTP scans differ in that you should configure
the ASA to scan traffic sent from the outside to SMTP servers protected by the ASA.
Information About the CSC SSM, page 1-1
Licensing Requirements for the CSC SSM, page 1-5
Prerequisites for the CSC SSM, page 1-5
Guidelines and Limitations, page 1-6
Default Settings, page 1-6
Configuring the CSC SSM, page 1-7
Monitoring the CSC SSM, page 1-13
Troubleshooting the CSC Module, page 1-14
Configuration Examples for the CSC SSM, page 1-17
Additional References, page 1-18
Feature History for the CSC SSM, page 1-19
shows the flow of traffic through an ASA that has the following:
A CSC SSM installed and configured.
A service policy that determines what traffic is diverted to the CSC SSM for scanning.
1
C H A P T E R
Cisco ASA Series CLI Configuration Guide
1-1

Advertisement

Table of Contents
loading

Table of Contents