TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 11
Reusability of firewall policies, for example in the VPN control
Selective application of IPS by individual firewall rules
The following diagram shows the order of processing by the three controls on traffic
incoming to a TMS zl Module zone interface:
Figure 1: TMS zl Module Interface Inbound Processing Flow
Packets inbound on an interface are first processed by the firewall. If they are permitted
by the security policy rules, then they will pass to the VPN Gateway for decryption, if
necessary. Finally, now that even originally encrypted traffic is in the clear, the Intrusion
Prevention System will inspect the packet for malicious activity signatures, specific
protocol anomalies and general IP anomalies. At any of these three processing stages, the
traffic is subject to either being summarily dropped or having its connection reset if it is
found to be outside of configured security policy rules.
The order of processing is slightly different for traffic exiting the TMS zl Module on one
of its zone interfaces:
Figure 2: TMS zl Module Interface Outbound Processing Flow