Cisco 5510 Getting Started Guide - Page 184
About Deploying the Adaptive Security Appliance with the CSC SSM
UPC - 882658094767
View all Cisco 5510 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 184 highlights
About Deploying the Adaptive Security Appliance with the CSC SSM Chapter 14 Configuring the CSC SSM content profiles it obtains from Trend Micro. It then forwards legitimate content on to the adaptive security appliance for routing, or blocks and reports content that is suspicious. In addition to obtaining content profiles from Trend Micro, system administrators can also customize the configuration so that the CSC SSM scans for additional traffic types or locations. For example, system administrators can configure the CSC SSM to block or filter specific URLs, as well as scan for FTP and e-mail parameters. You use ASDM for system setup and monitoring of the CSC SSM. For advanced configuration of content security policies in the CSC SSM software, you access the web-based GUI for the CSC SSM by clicking links within ASDM. This chapter describes how to configure the adaptive security appliance for the deployment. Use of the CSC SSM GUI is explained in the Cisco Content Security and Control SSM Administrator Guide. About Deploying the Adaptive Security Appliance with the CSC SSM In a network in which the adaptive security appliance is deployed with the CSC SSM, you configure the adaptive security appliance to send to the CSC SSM only the types of traffic that you want to be scanned. Figure 14-1 illustrates the basic traffic flow between a company network, the adaptive security appliance and CSC SSM, and the Internet. The network illustrated in Figure 14-1 includes the following: • An adaptive security appliance with a CSC SSM installed and configured • A service policy on the adaptive security appliance specifies which traffic is diverted to the CSC SSM for scanning 14-2 Cisco ASA 5500 Series Getting Started Guide 78-19186-01