TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 61
10.0 Configuration of the TMS zl Module
Adding a TMS zl Module to an existing environment can pose certain challenges, depending on how it
is done. In some environments, the TMS zl Module will be protecting new networks and interfacing
these networks with the rest of the network is a relatively straightforward task. In most environments,
however, we have a stable network where the TMS zl Module will be introduced to enhance the security
of the network.
10.1 Network Diagrams
Let’s familiarize ourselves with the existing sample network first.
In this sample network, we have three main VLANs, one dedicated to switch
management, one dedicated to web servers, and one dedicated to web clients. The 5406zl
is acting as an IP router and is using extended Access Controls Lists (ACLs) to control
access from one VLAN to the other. The management VLAN is also defined and due to
its very nature, the 5406zl puts security restrictions on the management VLAN.
Figure 16