<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configuring CSC-SSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-csc-ssm/m-p/2069399#M54716</link>
    <description>&lt;P&gt;From what I've been reading about the SSM module is that there is a Base License and a Plus License.&lt;/P&gt;&lt;P&gt;The Base license allows the SSM module to do basic antivirus/spyware checking on your network. The Plus&lt;/P&gt;&lt;P&gt;License allows the Base License, Plus URL Filtering and Email filtering.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I'm assuming that the only way to block malicious web sites and URL filtering is through the SSM?&lt;/P&gt;&lt;P&gt;I guess you could also just apply ACLs but the best way would be through the SSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you purpose the CSC-SSM with Plus LIcense, and configure it, will there by any downtime associated with it,&lt;/P&gt;&lt;P&gt;when you switch the traffic being forwarded to the CSC from the ASA instead of just going out to the ASA and&lt;/P&gt;&lt;P&gt;to the Internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help guys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 12:45:46 GMT</pubDate>
    <dc:creator>JohnTylerPearce</dc:creator>
    <dc:date>2019-03-10T12:45:46Z</dc:date>
    <item>
      <title>Configuring CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/configuring-csc-ssm/m-p/2069399#M54716</link>
      <description>&lt;P&gt;From what I've been reading about the SSM module is that there is a Base License and a Plus License.&lt;/P&gt;&lt;P&gt;The Base license allows the SSM module to do basic antivirus/spyware checking on your network. The Plus&lt;/P&gt;&lt;P&gt;License allows the Base License, Plus URL Filtering and Email filtering.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I'm assuming that the only way to block malicious web sites and URL filtering is through the SSM?&lt;/P&gt;&lt;P&gt;I guess you could also just apply ACLs but the best way would be through the SSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you purpose the CSC-SSM with Plus LIcense, and configure it, will there by any downtime associated with it,&lt;/P&gt;&lt;P&gt;when you switch the traffic being forwarded to the CSC from the ASA instead of just going out to the ASA and&lt;/P&gt;&lt;P&gt;to the Internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help guys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-csc-ssm/m-p/2069399#M54716</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2019-03-10T12:45:46Z</dc:date>
    </item>
    <item>
      <title>Configuring CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/configuring-csc-ssm/m-p/2069400#M54719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt; I'm assuming that the only way to block malicious web sites and URL filtering is through the SSM?&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I guess you could also just apply ACLs but the best way would be through the SSM?&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;A/&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Well as the name said this is a content filtering device, he will apply policies based on what you configured, on the other hand the IPS-SSM will allow al traffic denying only the ones he found is ilegal so I would say yes you are right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;If you purpose the CSC-SSM with Plus LIcense, and configure it, will there by any downtime associated with it,&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;when you switch the traffic being forwarded to the CSC from the ASA instead of just going out to the ASA and&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;to the Internet?&lt;/P&gt;&lt;P&gt; A/ No downtime at all, just remember to have the CSC previously setup, a fail-open policy would be great and finally just redirect the traffic to see it working. As soon as the CSC is up and running there will be a peace association&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remember to rate all the helpful posts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 06:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-csc-ssm/m-p/2069400#M54719</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-28T06:51:48Z</dc:date>
    </item>
    <item>
      <title>Configuring CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/configuring-csc-ssm/m-p/2069401#M54724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the help jcarvaja. From what I was reading, it looks lilke the best way to go is, make sure to configure the CSC-SSM, so that if the module fails traffic passes as usual.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again Jcarvaja, thanks for the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 09:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-csc-ssm/m-p/2069401#M54724</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2012-08-28T09:56:58Z</dc:date>
    </item>
    <item>
      <title>Configuring CSC-SSM</title>
      <link>https://community.cisco.com/t5/network-security/configuring-csc-ssm/m-p/2069402#M54729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is always a pleasure to help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 19:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-csc-ssm/m-p/2069402#M54729</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-28T19:10:32Z</dc:date>
    </item>
  </channel>
</rss>

