Installation guide
Preface
1-xi
Chapter 4, Migrating to Inter-
Scan Web Security Virtual Appli-
ance
This chapter describes the different migration sce-
narios and how to complete a migration to
IWSVA.
Appendix A, Deployment Inte-
gration
This appendix describes deployment scenarios for
IWSVA, involving several technologies such as
LDAP, Cisco routers using WCCP, ICAP, and
Transparent Bridge.
Appendix B, Tuning and Trou-
bleshooting
This appendix describes performance tuning
involving URL filtering and LDAP performance.
Also, this appendix provides general trouble-
shooting tips and possible installation and feature
issues.
Appendix C, Best Practices for
IWSVA Installation and Deploy-
ment
This appendix describes the installation and
deployment best practices that Trend Micro rec-
ommends for IWSVA
Appendix D, Maintenance and
Technical Support
This appendix describes the maintenance agree-
ment and the aspects of the Trend Micro Techni-
cal Support Center.
Appendix E, Creating a New
Virtual Machine Under VMware
ESX for IWSVA
This appendix describes how to create a new vir-
tual machine for IWSVA under VMware ESX.
Appendix F, Creating a New
Virtual Machine Under Micro-
soft Hyper-V for IWSVA
This appendix describes how to create a new vir-
tual machine for IWSVA under Microsoft
Hyper-V.