The CSC SSM runs Content Security and Control software on some ASA models to provide protection against viruses, spyware, spam, and other unwanted traffic. It can scan FTP, HTTP/HTTPS, POP3, and SMTP traffic on their standard ports. You must obtain configuration information like the IP addresses and passwords to set up traffic scanning between the ASA and CSC SSM. The document provides steps to create access lists and policy maps to divert specified traffic to the CSC SSM for scanning.