HP ProCurve Threat Management Solution Design Guide 2009-04

2-8
Concepts
General Threat Management Architecture
In monitor mode, the TMS zl Module operates as an IDS, which analyzes traffic that is
mirrored to it: it detects protocol anomalies and known attacks, viruses, worms, and lax
security practices. When it detects a threat, it can log an event, send a notification to a
network administrator, or send a notification to an SNMP management console such as
PCM+/NIM.
Figure 2-5. Threat Management Solution with the TMS zl Module Operating in Monitor Mode
Detecting and Responding to Threats
These components work together to detect and respond to threats, as described below:
1. Several detection activities happen simultaneously:
Figure 2-6. Threat Management Solution’s Ability to Detecting and Responding to Threats
NIM analyzes traffic metrics (an sFlow or XRMON stream of sampled traffic) from the
network, looking for anomalies that indicate the presence of a threat. This process is
called network behavior anomaly detection, or NBAD.
ProCurve Switch
Traffic in
from Network
Traffic out
to Network
Mirrored Traffic
(in Tunnel)
TMS zl Module
in Monitor Mode