Chapter 14
Configuring the CSC SSM
Figure 14-1
Client
In this example, clients could be network users who are accessing a website,
downloading files from an FTP server, or retrieving mail from a POP3 server.
In this configuration, the traffic flow is as follows:
1.
2.
3.
4.
5.
78-19186-01
About Deploying the Adaptive Security Appliance with the CSC SSM
CSC SSM Traffic Flow
Main System
Request sent
inside
Reply forwarded
CSC SSM
The client initiates a request.
The adaptive security appliance receives the request and forwards it to the
Internet.
When the requested content is retrieved, the adaptive security appliance
determines whether its service policies define this content type as one that
should be diverted to the CSC SSM for scanning, and does so if appropriate.
The CSC SSM receives the content from the adaptive security appliance,
scans it and compares it to its latest update of the Trend Micro content filters.
If the content is suspicious, the CSC SSM blocks the content and reports the
event. If the content is not suspicious, the CSC SSM forwards the requested
content back to the adaptive security appliance for routing.
Adaptive
Security Appliance
modular
service
policy
Diverted Traffic
content security scan
Cisco ASA 5500 Series Getting Started Guide
Request forwarded
outside
Reply sent
Server
14-3