22-14
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 22 Managing the AIP SSM and CSC SSM
Managing the CSC SSM
To enable traffic scanning with the CSC SSM, use the
csc
command, which must be part of a service
policy. Service policies can be applied globally or to specific interfaces; therefore, you can enable the
csc
command globally or for specific interfaces.
Adding the
csc
command to your global policy ensures that all unencrypted connections through the
adaptive security appliance are scanned by the CSC SSM; however, this setting may mean that traffic
from trusted sources is needlessly scanned.
If you enable the
csc
command in interface-specific service policies, it is bi-directional. Bi-directionality
means that when the adaptive security appliance opens a new connection, if the
csc
command is active
on either the inbound or the outbound interface of the connection and the class map for the policy
identifies traffic for scanning, the adaptive security appliance diverts this traffic to the CSC SSM.
However, bi-directionality also means that if you divert any of the supported traffic types that cross a
given interface to the CSC SSM, it is probably performing unnecessary scans on traffic from your trusted
inside networks. For example, URLs and files requested from web servers on a DMZ network are
unlikely to pose content security risks to hosts on an inside network, and you probably do not want the
adaptive security appliance to divert this traffic to the CSC SSM.
Therefore, we recommend using access lists to further limit the traffic selected by the class maps of CSC
SSM service policies. Specifically, use access lists that match the following:
•
HTTP connections to outside networks.
•
FTP connections from clients inside the adaptive security appliance to servers outside the adaptive
security appliance.
•
POP3 connections from clients inside the security appliance to servers outside the adaptive security
appliance.
•
Incoming SMTP connections destined to inside mail servers.
In
Figure 22-7
, the adaptive security appliance should be configured to divert traffic to CSC SSM
requests from clients on the inside network for HTTP, FTP, and POP3 connections to the outside network
and incoming SMTP connections from outside hosts to the mail server on the DMZ network. HTTP
requests from the inside network to the web server on the DMZ network should not be scanned.
Figure 22-7
Common Network Configuration for CSC SSM Scanning
To identify the traffic that you want to scan, you can configure the adaptive security appliance in
different ways. One approach is to define two service policies, one on the inside interface and the other
on the outside interface, each with an access list that matches traffic to be scanned. The following access
list can be used on the policy applied to the inside interface:
192.168.30.0
192.168.20.0
(dmz)
Web server
Mail server
192.168.10.0
Internet
outside
inside
Security
appliance
143800
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......