Installation guide
Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide
2-32
6. The modified page returns to the requestor.
F
IGURE
2-15.
HTTP Reverse Proxy in Dependent Mode
T
ABLE
2-9.
More About HTTP Reverse Proxy in Dependent Mode
A
DVANTAGES
L
IMITATIONS
IWSVA scans all objects before they
are cached.
New engines, patterns, and configura-
tions will not affect cached objects.
The access logging feature of IWSVA
is compromised.