Installation guide

Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide
2-16
settings. This requires cooperation from your network users, and also makes it possible
for users to exempt themselves from your organizations security policies by
reconfiguring their Internet connection settings.
Note: If you configure IWSVA to work in standalone mode, each client on your network
needs to configure their Internet connection settings to use the IWSVA device and
port (default 8080) as their proxy server.
Web page requests follow this sequence:
1. The Web client sends a request to the HTTP service.
2. The HTTP service validates the request, if the URL is not blocked. If the URL is
invalid (blocked), the HTTP service sends the HTTP client an appropriate notice,
completing the transaction. If the URL is valid, the HTTP service attempts to
connect to the applicable Web server.
3. The contacted Web site returns a response from the Web server to the HTTP
service.
4. The HTTP service scans the content for unwanted data and returns the appropriate
response to the client.
HTTP Proxy in Simple Transparency Mode
Multiple IWSVA servers can be installed to balance your network traffic and scanning
load. In this installation example, a Layer 4 switch receives clients requests and then
forwards them to the IWSVA servers.
T
ABLE
2-3.
HTTP Proxy in Standalone Mode
A
DVANTAGE
L
IMITATION
Simple to install and deploy. Slow connection reaches maximum
allowed connections limit.
Each client on the network must config-
ure their proxy server.