HP ProCurve Threat Management Solution Design Guide 2009-04
2-24
Concepts
Deployment Options
(For specific information on how to configure the TMS zl Module in routing mode to
provide internal protection, see the HP ProCurve Threat Management Services zl Module
Management and Configuration Guide, which is available on the HP ProCurve Network
Web site at http://www.procurve.com/customercare/support/manuals/index.htm.)
Figure 2-17. NIM with the TMS zl Module Operating in Routing Mode and Providing Internal
Protection
■ NIM + TMS zl Module in Monitor Mode—You can also use a TMS zl Module that
operates in monitor mode as part of a Threat Management Solution. Again, you can
configure the TMS zl Module through PCM+ and have the module send SNMP traps to NIM
for analysis or action.
In monitor mode, TMS zl Module analyzes traffic that is mirrored to its internal port 1. The
module uses its IDS/IPS signatures to screen the traffic for threats and sends an SNMP trap
to NIM.(The module can also log the threats to its internal log, send the message to a syslog
server, or notify an administrator with an email.) (For specific information on how to
configure the TMS zl Module in monitor mode, see the HP ProCurve Threat Management
Internet
NIM
Data
Center
HP ProCurve 5406zl Switch
with TMS zl Module
Visitor Lobby
Conference Rooms
SNMP Traps
to NIM
NIM Response to Any
Supported Switch or
Wireless Device