HP ProCurve Threat Management Solution Design Guide 2009-04

4-1
Design
4
Design
After completing the design process outlined in this chapter, you should have:
A list of the software and hardware you need to implement an HP ProCurve Threat
Management Solution on your network
A design that you can implement to provide threat protection for your network
Do not be surprised, however, if your design does not at first seem as solid as you expected.
Designing a Threat Management Solution is really more of an iterative process rather than a
one-time, hard-and-fast network layout. Remember the security management life cycle shown
in Figure 4-1. (For more information about this life cycle, see Chapter 2: “Concepts.”) You will
first develop your security policy and configure individual policies in HP ProCurve Network
Immunity Manager (NIM) to protect your network from threats. Then, you will analyze the
results of the policies’ actions and refine your policies in a continuous improvement loop.
Figure 4-1. Security Management Life Cycle