Cisco 5510 Getting Started Guide - Page 187

Configuration Requirements, Configuring the CSC SSM for Content Security

Page 187 highlights

Chapter 14 Configuring the CSC SSM Scenario: Security Appliance with CSC SSM Deployed for Content Security In this scenario, the customer has deployed an adaptive security appliance with a CSC SSM for content security. Of particular interest are the following points: • The adaptive security appliance is on a dedicated management network. Although using a dedicated management network is not required, we recommend it for security purposes. • This adaptive security appliance configuration has two management ports: one for the adaptive security appliance itself, and another for the CSC SSM. All administration hosts must be able to access both IP addresses. • The HTTP proxy server is connected to both the inside network and the dedicated management network. This enables the CSC SSM to retrieve updated content security filters from the Trend Micro update server. • The management network includes an SMTP server so that administrators can be notified of CSC SSM events. The management network also includes a syslog server to store logs generated by the CSC SSM. This section includes the following topics: • Configuration Requirements, page 14-5 • Configuring the CSC SSM for Content Security, page 14-6 Configuration Requirements When you plan the adaptive security appliance deployment, it is critical that the network adheres to the following requirements: • The SSM management port IP address must be accessible by the hosts used to run ASDM. However, the IP addresses for the SSM management port and the adaptive security appliance management interface can be in different subnets. • The SSM management port must be able to connect to the Internet so that the CSC SSM can reach the Trend Micro update server. 78-19186-01 Cisco ASA 5500 Series Getting Started Guide 14-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

14-5
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 14
Configuring the CSC SSM
Scenario: Security Appliance with CSC SSM Deployed for Content Security
In this scenario, the customer has deployed an adaptive security appliance with a
CSC SSM for content security. Of particular interest are the following points:
The adaptive security appliance is on a dedicated management network.
Although using a dedicated management network is not required, we
recommend it for security purposes.
This adaptive security appliance configuration has two management ports:
one for the adaptive security appliance itself, and another for the CSC SSM.
All administration hosts must be able to access both IP addresses.
The HTTP proxy server is connected to both the inside network and the
dedicated management network. This enables the CSC SSM to retrieve
updated content security filters from the Trend Micro update server.
The management network includes an SMTP server so that administrators can
be notified of CSC SSM events. The management network also includes a
syslog server to store logs generated by the CSC SSM.
This section includes the following topics:
Configuration Requirements, page 14-5
Configuring the CSC SSM for Content Security, page 14-6
Configuration Requirements
When you plan the adaptive security appliance deployment, it is critical that the
network adheres to the following requirements:
The SSM management port IP address must be accessible by the hosts used
to run ASDM. However, the IP addresses for the SSM management port and
the adaptive security appliance management interface can be in different
subnets.
The SSM management port must be able to connect to the Internet so that the
CSC SSM can reach the Trend Micro update server.