TMS zl Management and Configuration Guide ST.1.1.100226
1-73
Overview
Feature Interaction
Feature Interaction
This section explains how the TMS zl Module’s various capabilities work
together to protect your network from threats.
Packet Flow on the TMS zl Module
Understanding how packets flow through the TMS zl Module helps you to
understand how features interact.
Packet Flow in Routing Mode
In routing mode, the TMS zl Module applies features in this order:
1. VPN (decrypting incoming traffic)
2. Firewall attack checks
3. Pre-NAT firewall port triggers and ALGs
4. Firewall access policies
5. IDS/IPS
6. NAT
7. Post-NAT IDS/IPS
8. Post-NAT firewall port triggers and ALGs
9. VPN (encrypting outgoing traffic)
Figure 1-22 below shows a simplified flow chart for routing mode packet flow,
which is regulated by the TMS zl Module firewall.