Cisco 5510 Getting Started Guide - Page 185

CSC SSM Traffic Flow, Adaptive, Security Appliance, CSC SSM

Page 185 highlights

Chapter 14 Configuring the CSC SSM About Deploying the Adaptive Security Appliance with the CSC SSM Figure 14-1 CSC SSM Traffic Flow Adaptive Security Appliance Main System Request sent inside Reply forwarded Client modular service policy Diverted Traffic Request forwarded outside Reply sent Server 148386 content security scan CSC SSM In this example, clients could be network users who are accessing a website, downloading files from an FTP server, or retrieving mail from a POP3 server. In this configuration, the traffic flow is as follows: 1. The client initiates a request. 2. The adaptive security appliance receives the request and forwards it to the Internet. 3. When the requested content is retrieved, the adaptive security appliance determines whether its service policies define this content type as one that should be diverted to the CSC SSM for scanning, and does so if appropriate. 4. The CSC SSM receives the content from the adaptive security appliance, scans it and compares it to its latest update of the Trend Micro content filters. 5. If the content is suspicious, the CSC SSM blocks the content and reports the event. If the content is not suspicious, the CSC SSM forwards the requested content back to the adaptive security appliance for routing. 78-19186-01 Cisco ASA 5500 Series Getting Started Guide 14-3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

14-3
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 14
Configuring the CSC SSM
About Deploying the Adaptive Security Appliance with the CSC SSM
Figure 14-1
CSC SSM Traffic Flow
In this example, clients could be network users who are accessing a website,
downloading files from an FTP server, or retrieving mail from a POP3 server.
In this configuration, the traffic flow is as follows:
1.
The client initiates a request.
2.
The adaptive security appliance receives the request and forwards it to the
Internet.
3.
When the requested content is retrieved, the adaptive security appliance
determines whether its service policies define this content type as one that
should be diverted to the CSC SSM for scanning, and does so if appropriate.
4.
The CSC SSM receives the content from the adaptive security appliance,
scans it and compares it to its latest update of the Trend Micro content filters.
5.
If the content is suspicious, the CSC SSM blocks the content and reports the
event. If the content is not suspicious, the CSC SSM forwards the requested
content back to the adaptive security appliance for routing.
148386
Adaptive
Security Appliance
Main System
Request sent
Client
Reply forwarded
inside
modular
service
policy
Request forwarded
Reply sent
CSC SSM
Server
Diverted Traffic
content security scan
outside