TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 20
Figure 5: Perimeter Security Control Point site-to-site VPN
Typical controls implemented by VPN Gateways are:
Authentication via Xauth against an internal, local list, RADIUS
Source authentication and data integrity through Authentication Header
(IPsec AH)
Source authentication, data integrity and confidentiality using
Encapsulating Security Payload (IPsec ESP)
Anti-replay with configurable window size of acceptable sequence
number difference
7.2 Data Center Security Enclave
The data center, with its concentration of high-value information assets, is another
increasingly common place to layer in additional security controls. The TMS zl Module
can be added to the data center to perform compartmentalization of the different servers
and services that they offer. When located at the boundary between the data center and
the rest of the enterprise network, it can turn the entire data center into a security enclave,
or it can be placed in such a way as to perform both functions as shown in Figure 6: