Installation guide
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide
2-6
There are seven possible deployment modes:
Transparent Bridge Settings
• Transparent Bridge mode — Use the transparent bridge mode when clients'
computers are not configured to use the IWSVA server as their proxy, but still need
to connect to the Internet through IWSVA. All network traffic, including
HTTP/HTTPS and FTP, is visible to IWSVA in this mode.
• Transparent Bridge High-Availability (HA) mode — Use this mode when two
IWSVA devices are configured as a cluster to offer continuous service if one of the
IWSVA cluster members fails.
Forward Proxy Settings:
• Standalone mode — Use this flow when ICAP devices are not being used with
IWSVA, and IWSVA connects directly to the Internet.
• Dependent mode — Use this flow when ICAP devices are not being used with
IWSVA, and IWSVA cannot connect directly to the Internet, but must instead
connect through another HTTP proxy. This is can be accomplished in one of the
following ways:
•Proxy-ahead mode
• Proxy-behind mode (not recommended)
• Double-proxy mode
• Forward Proxy with Transparency — Use this mode when using an L4 (Load
Balancing) switch.
• WCCP — Use the WCCP protocol in conjunction with WCCP enabled devices
with IWSVA
Reverse Proxy Settings:
• Reverse proxy mode — Use this flow to protect a Web server with a proxy server
by placing the HTTP proxy between the Internet and the Web server. (Used by ISPs
and ASPs to protect the upload traffic against viruses and by organizations with
complex Web sites that need a centralized point of access control.)
ICAP Proxy Settings:
• ICAP protocol mode — Use the ICAP protocol flow to use ICAP devices with
IWSVA