TMS zl Management and Configuration Guide ST.1.2.100916

4-22
Firewall
Firewall Access Policies
8. Click Save.
Note The TSM zl Module gets its time and date information from the host switch. If
the time has not been properly configured on the switch, then the schedules
will not be applied at the right time.
Firewall Access Policies
This section covers the TMS zl Module firewall access policies, which control
all traffic routed in and out of TMS VLANs:
For detailed information about access policies, see “Access Policy Con-
cepts” on page 4-22.
To learn how to create access policies, see “Create Firewall Access
Policies” on page 4-29.
To learn how to manage access policies, including best practices for to
modifying and deleting them, see “Guidelines for Managing Access Poli-
cies” on page 4-33.
For example access policies, see “Policy Examples” on page 4-40.
Access Policy Concepts
A networks first line of defense is its firewall, and the firewalls access policies
determine its effectiveness. The access policies tell the firewall which types
of traffic are allowed to cross TMS VLAN boundaries.
For ease of configuration and management, the TMS zl Module divides TMS
VLANs into zones, which are logical areas of trust. (For more information on
zones, see “Zones” on page 1-12.)
Access Policy Groups
Firewall access policies are grouped by the following criteria:
Source and destination zones
Unicast or multicast traffic
User group (for unicast access policies only)