TMS zl Management and Configuration Guide ST.1.0.090213
1-8
Overview
Operating Modes
Figure 1-1. Traffic Managed by the TMS zl Module
In this example, you can see that traffic between the server in VLAN 10 and
the Internet passes through the module, as does traffic between VLAN 30 and
VLAN 40. However, traffic between the two nodes in VLAN 20 is forwarded
directly by the switch at Layer 2, thereby bypassing the module. Only traffic
that requires Layer 3 routing can be filtered by the TMS zl Module.
When the TMS zl Module routes traffic, it applies the security features that
you have configured—IPS policies, firewall attack checks, firewall access
policies, NAT policies, and VPN policies (IPsec and L2TP policies). When all
policies have been applied—and if the module has not determined that the
traffic poses a threat and must be dropped—the TMS zl Module routes the
traffic to its destination, forwarding it to the switch on the correct destination
VLAN.
Table 1-2. Routing Mode
Supported Capabilities Filtered Traffic
• IDS/IPS
• Firewall
•NAT
• VPN
• Routing
•HA
Traffic routed between TMS VLANs