Installation guide

Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide
2-10
FTP requests follow this sequence:
1. The FTP client sends a request to the IWSVA FTP service.
2. The IWSVA FTP service validates the request (for example, the file type is not
blocked). If the request is valid, the IWSVA FTP service relays it to the other FTP
proxy or the FTP server being protected by IWSVA.
3. The FTP server on the Internet responds to the request, ideally with the requested
file.
4. The IWSVA FTP service scans the returned data for unwanted content. If it finds
any unwanted content, it returns an appropriate message to the FTP client.
Otherwise, it returns the requested data to the FTP client.
F
IGURE
2-4.
FTP Proxy in Dependent Mode
Deploying in Forward Proxy Mode
Overview of Forward Proxy Mode
There are two kinds of Forward Proxy: transparent and non-transparent. Transparent
proxy can be achieved by a Layer 4 switch (Simple Transparency) or a WCCP-enabled
switch (WCCP mode).