Cisco Systems ASA 5500 Home Security System User Manual


 
10-3
Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide
78-17611-01
Chapter 10 Configuring the CSC SSM
About Deploying the Security Appliance with the CSC SSM
Figure 10-1 CSC SSM Traffic Flow
In this example, clients could be network users who are accessing a website,
downloading files from an FTP server, or retrieving mail from a POP3 server.
In this configuration, the traffic flow is as follows:
1. The client initiates a request.
2. The adaptive security appliance receives the request and forwards it to the
Internet.
3. When the requested content is retrieved, the adaptive security appliance
determines whether its service policies define this content type as one that
should be diverted to the CSC SSM for scanning, and does so if appropriate.
4. The CSC SSM receives the content from the adaptive security appliance,
scans it and compares it to its latest update of the Trend Micro content filters.
5. If the content is suspicious, the CSC SSM blocks the content and reports the
event. If the content is not suspicious, the CSC SSM forwards the requested
content back to the adaptive security appliance for routing.
148386
Security Appliance
Main System
Request sent
Client
Reply forwarded
inside
modular
service
policy
Request forwarded
Reply sent
CSC SSM
Server
Diverted Traffic
content security scan
outside