One method of SSL means that the server does not verify the identity of the client. It does not affect any other SSL security features.
While the SSL protocol is a little complicated, the main point is what happens: the client generates a random key, encrypts it so that only the server can decrypt it and send it to the server. Now the server and the client have a common secret, which can be used to encrypt and verify messages in both directions.
The server has no idea about the client identifier, but otherwise, the encryption and messages are checked in two ways.
Update:
1) Yes, the encryption in both directions is symmetric and uses the shared secret generated during the session setup.
2) With a shared secret, message integrity is trivial to guarantee. You just make sure that the message has a certain form. For example, I can prefix each sent message with a sequence number and add a checksum to it before encryption. You decrypt it with a shared secret and check the serial number and checksum. How can an attacker replace or change a message without knowing the shared secret and keeping the sequence number and checksum unchanged?
David schwartz
source share