TMS zl Management and Configuration Guide ST.1.2.100916
2-4
Initial Setup in Routing Mode
Overview
Overview
This chapter provides instructions for the initial setup of the TMS zl Module
in routing mode. Later chapters provide instructions for configuring specific
features such as the firewall, IDS/IPS, and VPN.
At this point, you should have decided which operating mode you want to use.
(See “Operating Modes” in Chapter 1: “Overview.”) You have chosen routing
mode because you want to take advantage of these features:
■ Firewall
• Access policies
• Application-level gateways (ALGs)
• Network address translation (NAT)
■ Virtual private networks (VPNs)
■ Intrusion detection/prevention system (IDS/IPS)
■ High availability (HA) clusters
■ Network authentication
If you want to enable only the features in this next list, see Chapter 3: “Initial
Setup in Monitor Mode.”
■ Passive monitoring of threats inside your network (but not automatically
preventing or blocking them)
■ Monitoring traffic that is remotely mirrored to the TMS zl Module for
threats and intrusion attempts
■ Monitoring traffic without deploying an inline appliance in a high-band-
width network, such as a research and development laboratory
Note A TMS zl Module can run in only one operating mode at a time. If you switch
from one operating mode to another, the module will revert to the factory
defaults for the new mode, or it will revert to any settings that you may have
configured previously for that mode.
Routing Mode
Routing is the default operating mode for the TMS zl Module. It is a Layer 3
mode in which the TMS zl Module acts as a router for TMS VLANs, which it
filters and controls.