Installation guide

Trend Micro™ InterScan™ Web Security Virtual Appliance 6.5 Installation Guide
2-34
Note: Silicom bypass cards are recognized by VMware ESXi 5.0, but they can only be used
as NORMAL network cards without the bypass function.
Planning the HTTP Flow Using Transparent Bridge Mode
For complete details on implementing the Forward Proxy Mode, see Transparent Bridge
Mode on page 1-9.
IWSVA configured in Transparent Bridge Mode processes Web page requests in the
following sequence:
1. The Web client sends a request to the Web server.
2. IWSVA accepts the connection from client and sends the request to the Web server.
3. IWSVA establishes a connection with the Web client.
4. IWSVA establishes the connection with the Web server and gets data from the Web
server.
5. If the data contains no viruses, then IWSVA sends the data to the Web client.
6. If the data contains a virus, then IWSVA sends the blocked page to the Web client.
High Availability Deployment Mode
IWSVA 6.5 Transparent Bridge mode supports deployment in High Availability (HA)
mode where two IWSVA 6.5 nodes are configured as an HA cluster. In this
configuration one of the nodes is designated as the parent, or active node, and is
connected to a child, or passive node, through a “heartbeat” link.
For HA mode deployments, it is recommended to perform a bare metal installation of
each IWSVA 6.5 HA cluster member. This avoids the situation where both HA cluster
members are installed in a virtual server and the virtual server becomes inoperable. In
this situation, both members of the HA cluster will also become inoperable.