Data Security Gateway (DSG)

The DSG is a flexible platform that applies security operations on the network to protect sensitive data in various environments, including on-premises, virtualized, and cloud. It safeguards data across SaaS applications, web interfaces, APIs, and file transfers using Configuration over Programming (CoP) profiles.

Architecture diagram for DSG v3.3.0.0

Architecture diagram for DSG v3.3.0.0

Architecture diagram for ESA v10.1.0 with v3.3.0.0

Architecture diagram for ESA v10.1.0 with v3.3.0.0

Architecture diagram for DSG v3.3.0.0 in TAC

Architecture diagram for DSG v3.3.0.0 in TAC


ComponentActive FlowFailover Flow
Deployment of Rulesets from ESA_____- - - - - -
Policy Download_____- - - - - -
Forwarding of Audit Events to ESA_____- - - - - -

Communication Flow

DSG-1: DSG node configured during DSG patch installation in ESA.

DSG-2 to DSG-n: Other DSGs in TAC

Below table describes communication flows as depicted in diagrams above.

Communication Flow

FlowRequest InitiatorDestinationPortProtocolFlow DescriptionConfiguration
Deployment of Rulesets from ESA
ESA P1DSG-1443TLS
Step-1: ESA P1 initiates HTTPs request to DSG-1 directly without GTM/LTM to send command for DSGs to pull rulesets from ESA P1.
If DSG-1 is down, then ESA P1 connects to any of the DSGs i.e. DSG-2 to DSG-n
Primary Active Flow: Sticky to ESA P1 with other ESAs as standby ESA P1 -> DSG-1
DR Flow: Sticky to ESA S3 with other ESAs as standby ESA S3 -> DSG-1
DSG node configured during DSG patch installation in ESAAll other DSGs in TAC8300TLS
Step-2: DSG forwards the command to pull rulesets to all other DSGs in TAC
Not Applicable
All DSGs in TACESA P1443TLS
Step-3: All DSGs in TAC pulls rulesets from ESA P1 parallelly
Primary Active Flow: Sticky to ESA P1 with other ESAs as standby All DSGs in TAC -> ESA P1
DR Flow: Sticky to ESA S3 with other ESAs as standby
All DSGs in TAC -> ESA S3
Policy Download
Pepserver in the Protector nodeService Dispatcher in ESA8443TLS
  1. Through GTM.
  2. Through LTM-1 for active flow and LTM-2 for failover flow to Service Dispatcher in ESA.
Primary Active Flow: Sticky to ESA P1 with other ESAs as standby
Protector 9.1 ->GTM ->LTM-1 ->ESA P1
DR Flow: Sticky to ESA S3 with other ESAs as standby
Protector 9.1 ->GTM ->LTM-2 ->ESA S3
Forwarding of Audit Events to ESA
Log Forwarder in the protector nodeInsight in ESA9200TLS
  1. Through GTM.
  2. Through LTM-1 for active flow and LTM-2 for failover flow to Insight in ESA.
Primary Active Flow: Routed to all ESAs in the Primary Site
Protector 9.1/10.0 ->GTM ->LTM-1 ->ESA P1, S1,S2
DR Flow: Routed to all ESAs in the DR Site
Protector 9.1/10.0 ->GTM ->LTM-2 ->ESA S3, S4,S5
Forwarding of Audit Events to External SIEM using the ESA
Log Forwarder in the protector nodeTD-Agent in ESA24224/ 24284Non-TLS/TLS
  1. Through GTM.
  2. Through LTM-1 for active flow and LTM-2 for failover flow to Insight in ESA.
Primary Active Flow: Routed to all ESAs in the Primary Site
Protector 9.1/10.0 ->GTM ->LTM-1 ->ESA P1, S1,S2 -> External SIEM
DR Flow: Routed to all ESAs in the DR Site
Protector 9.1/10.0 -> GTM -> LTM-2 -> ESA S3, S4,S5 -> External SIEM

Last modified : July 30, 2025