TMS zl Module Installation and Getting Started Guide 2010-03

2-3
Getting Started
Access control zones
Traffic that passes between locations on the network or from an outside
network to the internal network. The following nine zones are supported:
Internal-your autonomous system
External-untrusted networks outside your autonomous system
DMZ-demilitarized zone; publicly-accessible servers that are logically
located between the Internal zone and the External zone
Zones 1-6: optional zones on the internal network
Deployment Options
This section gives an overview of the several use models for deploying the
module. For more information see the Threat Management Services zl Module
Management and Configuration Guide.
Internal Threat Protection
The TMS zl module can protect a private network from internal threats much
as a traditional security device protects a network from external threats. It is
primarily protection against network threats (intentional or unintentional)
that originate from trusted internal users or devices inside the network.
Perimeter Protection
The TMS zl module is deployed at the perimeter of the network to protect the
internal network from threats from an external attack, such as from the
Internet.
Access Control with Authentication
The TMS zl module can force a user to authenticate to the network and then
control the user with access policies that are specific to that user’s group.
The TMS zl module can authenticate users to:
Its local database
An external RADIUS server
zlSM.book Page 3 Monday, March 1, 2010 11:42 PM