Cisco Systems ASA 5500 Manual De Usuario

Descargar
Página de 144
Chapter 10      Configuring the CSC SSM
  About Deploying the Security Appliance with the CSC SSM
10-2
Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide
78-17611-01
In addition to obtaining content profiles from Trend Micro, system administrators 
can also customize the configuration so that the CSC SSM scans for additional 
traffic types or locations. For example, system administrators can configure the 
CSC SSM to block or filter specific URLs, as well as scan for FTP and email 
parameters. 
You use ASDM for system setup and monitoring of the CSC SSM. For advanced 
configuration of content security policies in the CSC SSM software, you access 
the web-based GUI for the CSC SSM by clicking links within ASDM. 
This chapter describes how to configure the adaptive security appliance for the 
deployment. Use of the CSC SSM GUI is explained in the Cisco Content Security 
and Control SSM Administrator Guide
About Deploying the Security Appliance with the 
CSC SSM
In a network in which the adaptive security appliance is deployed with the CSC 
SSM, you configure the adaptive security appliance to send to the CSC SSM only 
the types of traffic that you want to be scanned. 
 illustrates the basic traffic flow between a company network, the 
adaptive security appliance and CSC SSM, and the Internet. The network 
illustrated in 
 includes the following: 
An adaptive security appliance with a CSC SSM installed and configured
A service policy on the adaptive security appliance specifies which traffic is 
diverted to the CSC SSM for scanning