Installation guide
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide
2-20
Web page requests follow this sequence:
1. The Web client sends a request to the HTTP proxy server.
2. The proxy server forwards the request to IWSVA.
3. IWSVA validates the request using URL Filtering/URL Access Control:
• If the URL is invalid (blocked), the HTTP service sends the HTTP client an
appropriate notice, completing the transaction.
• If the URL is valid, the HTTP service forwards the request to the Web server
on the Internet.
4. The contacted Web server returns a response (ideally a Web page) to IWSVA.
5. IWSVA performs its processing on the returned data (virus, spyware, ActiveX
scanning), then forwards the appropriate response/data to the proxy server.
6. The Proxy server caches the data (if cacheable), then delivers the response/data to
the HTTP client.
F
IGURE
2-9.
HTTP Proxy in Dependent Mode (Proxy Behind)
T
ABLE
2-5.
HTTP Proxy in Dependent Mode (Proxy Behind)
A
DVANTAGES
L
IMITATIONS
No configuration changes required
on the clients.
Configuration changes or pattern
updates on IWSVA do not affect cached
objects.