Cisco Cisco ASA 5520 Adaptive Security Appliance 技术手册

下载
页码 37
In this example, clients can be network users who access a web site, download files from an FTP server, or
retrieve mail from a POP3 server.
In this configuration, this is how the traffic flows:
The client initiates a request.
1. 
The adaptive security appliance receives the request and forwards it to the Internet.
2. 
When the requested content is retrieved, the adaptive security appliance determines whether its
service policies define this content type as one that should be diverted to the CSC−SSM for scanning,
and does so if appropriate.
3. 
The CSC−SSM receives the content from the adaptive security appliance, scans it and compares it to
its latest update of the Trend Micro content filters.
4. 
If the content is suspicious, the CSC−SSM blocks the content and reports the event. If the content is
not suspicious, the CSC−SSM forwards the requested content back to the adaptive security appliance
for routing.
5. 
CSC Initial Setup
In the initial setup, several parameters need to be configured. Make sure you have gathered the information
required for these parameters before you begin.
As the first step to configure the CSC−SSM, launch the Cisco ASDM. By default, you can access the
CSC−SSM through the management IP address of the ASA at https://192.168.1.1/. You need to ensure that
your PC and the management interface of ASA are in the same network. Alternatively, you can download the
ASDM Launcher for subsequent accesses.
Configure these parameters with the ASDM:
Once in main ASDM window, choose Configuration > Trend Micro Content Security > Wizard
Setup
 and click Launch Setup Wizard.
1.