Cisco Systems ASA 5500 manual Csc Ssm, About Deploying the Security Appliance with the, 10-2

Models: ASA 5500

1 144
Download 144 pages 23.87 Kb
Page 116
Image 116
About Deploying the Security Appliance with the

Chapter 10 Configuring the CSC SSM

About Deploying the Security Appliance with the CSC SSM

In addition to obtaining content profiles from Trend Micro, system administrators can also customize the configuration so that the CSC SSM scans for additional traffic types or locations. For example, system administrators can configure the CSC SSM to block or filter specific URLs, as well as scan for FTP and email parameters.

You use ASDM for system setup and monitoring of the CSC SSM. For advanced configuration of content security policies in the CSC SSM software, you access the web-based GUI for the CSC SSM by clicking links within ASDM.

This chapter describes how to configure the adaptive security appliance for the deployment. Use of the CSC SSM GUI is explained in the Cisco Content Security and Control SSM Administrator Guide.

About Deploying the Security Appliance with the

CSC SSM

In a network in which the adaptive security appliance is deployed with the CSC SSM, you configure the adaptive security appliance to send to the CSC SSM only the types of traffic that you want to be scanned.

Figure 10-1illustrates the basic traffic flow between a company network, the adaptive security appliance and CSC SSM, and the Internet. The network illustrated in Figure 10-1includes the following:

An adaptive security appliance with a CSC SSM installed and configured

A service policy on the adaptive security appliance specifies which traffic is diverted to the CSC SSM for scanning

 

Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide

10-2

78-17611-01

Page 116
Image 116
Cisco Systems ASA 5500 manual Csc Ssm, About Deploying the Security Appliance with the, 10-2