Installation guide
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide
2-4
• The firewall configuration allows connections to machines on the corporate LAN.
For security, the firewall must limit the types of data that can reach machines on the
LAN. For example, the firewall might allow HTTP data from the Internet to reach
only the IWSVA server.
F
IGURE
2-2.
One Firewall with DMZ
Planning Network Traffic Flows
There are several ways to direct network traffic through IWSVA for protection,
including the following:
• Reconfiguring client settings to point to IWSVA as a proxy
• Using a Layer 4 switch
• Using an ICAP-enabled proxy to redirect selected traffic for scanning
• Using WCCP to direct selected traffic for scanning
• Forwarding traffic from another proxy and/or caching device
See Appendix A, Deployment Integration starting on page A-1 for more details.
Each network traffic flow configuration has implications for configuring IWSVA,
configuring the network, and for network security.