Installation guide
Deployment Primer
2-31
Note: Administrators should be aware of the following:
- The URL-filtering feature makes no sense in this configuration; only antivirus
scanning and URL-blocking are useful.
- In the reverse proxy mode, the Web server's access log is useless. To analyze the
connections for the Web site, you must use the IWSVA access log.
- Ideally, the reverse proxy server should be placed behind a firewall, but in many
cases, the proxy is connected directly to the Internet, where it is more vulnerable to
direct attacks. When a reverse proxy is configured without a firewall, administrators
should take all appropriate precautions in securing the operating system hosting
IWSVA.
IWSVA configured in Reverse Proxy Mode processes Web page requests in the
following sequence:
1. Clients initiate the Web request.
2. The request is received by Trend Micro™ InterScan™ Web Security Virtual
Appliance, and configured to listen on port 80.
3. Trend Micro™ InterScan™ Web Security Virtual Appliance scans the content, then
forwards it to an actual Web server.
4. The Web server delivers the requested page back to IWSVA.
5. Trend Micro™ InterScan™ Web Security Virtual Appliance rewrites the page
headers, and sends on the request.