TMS zl Management and Configuration Guide ST.1.0.090213

2-3
Initial Setup in Routing Mode
Overview
Overview
This setup chapter provides instructions for the initial setup in routing mode.
At this point, you should have decided which operating mode you want to use.
(See “Operating Modes” in Chapter 1: “Overview.”) You have chosen routing
mode because you want to take advantage of these features:
Firewall
Application-level gateways (ALGs)
Network address translation (NAT)
Virtual private networks (VPNs)
Intrusion detection/prevention system (IDS/IPS)
High availability (HA) clusters
Network authentication
If you want to enable only the IDS features listed below, see Chapter 3: “Initial
Setup in Monitor Mode.”
Passive monitoring of threats inside your network
Monitoring remote traffic for intrusions that do not pass through the
switch where the module is deployed
Monitoring intrusions but not preventing or blocking them
Monitoring traffic without deploying an appliance in-line in a high-band-
width network, such as a research and development laboratory
Note A TMS zl Module can run in only one operating mode at a time. If you switch
from one operating mode to another, the module will revert to the factory
defaults for the new mode, or it will revert to any settings that you may have
configured previously for that mode.
Routing Mode
Routing is the default operating mode for the TMS zl Module. It is a Layer 3
mode in which the TMS zl Module acts as a router for TMS VLANs, which it
filters and controls.