Cisco Systems ASA 5500 manual The client initiates a request, 10-3

Models: ASA 5500

1 144
Download 144 pages 23.87 Kb
Page 117
Image 117
1.The client initiates a request.

Chapter 10 Configuring the CSC SSM

 

 

About Deploying the Security Appliance with the CSC SSM

Figure 10-1

CSC SSM Traffic Flow

 

 

 

 

Security Appliance

 

 

 

 

Main System

 

 

 

 

modular

 

 

 

 

service

 

 

Request sent

policy

Request forwarded

 

 

 

 

inside

 

outside

 

Reply forwarded

Diverted Traffic

Reply sent

Server

 

 

 

Client

 

 

 

 

 

 

 

 

 

content security scan

 

148386

 

 

CSC SSM

 

 

 

 

 

In this example, clients could be network users who are accessing a website, downloading files from an FTP server, or retrieving mail from a POP3 server.

In this configuration, the traffic flow is as follows:

1.The client initiates a request.

2.The adaptive security appliance receives the request and forwards it to the Internet.

3.When the requested content is retrieved, the adaptive security appliance determines whether its service policies define this content type as one that should be diverted to the CSC SSM for scanning, and does so if appropriate.

4.The CSC SSM receives the content from the adaptive security appliance, scans it and compares it to its latest update of the Trend Micro content filters.

5.If the content is suspicious, the CSC SSM blocks the content and reports the event. If the content is not suspicious, the CSC SSM forwards the requested content back to the adaptive security appliance for routing.

Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide

 

78-17611-01

10-3

 

Page 117
Image 117
Cisco Systems ASA 5500 manual The client initiates a request, 10-3