Cisco Systems ASA 5500 Home Security System User Manual


 
Chapter 10 Configuring the CSC SSM
About Deploying the Security Appliance with the CSC SSM
10-2
Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide
78-17611-01
In addition to obtaining content profiles from Trend Micro, system administrators
can also customize the configuration so that the CSC SSM scans for additional
traffic types or locations. For example, system administrators can configure the
CSC SSM to block or filter specific URLs, as well as scan for FTP and email
parameters.
You use ASDM for system setup and monitoring of the CSC SSM. For advanced
configuration of content security policies in the CSC SSM software, you access
the web-based GUI for the CSC SSM by clicking links within ASDM.
This chapter describes how to configure the adaptive security appliance for the
deployment. Use of the CSC SSM GUI is explained in the Cisco Content Security
and Control SSM Administrator Guide.
About Deploying the Security Appliance with the
CSC SSM
In a network in which the adaptive security appliance is deployed with the CSC
SSM, you configure the adaptive security appliance to send to the CSC SSM only
the types of traffic that you want to be scanned.
Figure 10-1 illustrates the basic traffic flow between a company network, the
adaptive security appliance and CSC SSM, and the Internet. The network
illustrated in Figure 10-1 includes the following:
An adaptive security appliance with a CSC SSM installed and configured
A service policy on the adaptive security appliance specifies which traffic is
diverted to the CSC SSM for scanning