TMS zl Management and Configuration Guide ST.1.2.100916

2-6
Initial Setup in Routing Mode
Deploying the TMS zl Module
Provide a site-to-site VPN tunnel between the corporate head office and
branch offices
Provide a client-to-site VPN for the mobile workforce to connect to the
corporate intranet
Figure 2-1. Perimeter Deployment of the TMS zl Module
Internal Protection
The TMS zl Module in routing mode can be deployed inside the LAN to control
traffic that is routed between various network segments or departments, such
as the wireless LAN, a data center, or department users. Some of the key
reasons to deploy the TMS zl Module in routing mode inside the LAN are to:
Enforce firewall policies for traffic that is routed between network
segments
Detect and block attacks to business-critical data that is hosted in the data
center
Detect and block attacks from malicious internal users
Provide VPN access to wireless users