HP ProCurve Threat Management Solution Implementation Guide 2009-05
4-28
HP ProCurve Network Immunity Manager with HP ProCurve Security Devices
Step 2: Detect Threats
Figure 4-23. Sample Network
Once you associate a VLAN with a zone, it is called a TMS VLAN. The TMS zl Module filters
traffic that crosses a TMS VLAN boundary, but not traffic that is transmitted within the same
TMS VLAN.
Subtask: Access the TMS zl Module’s CLI
To begin the initial setup, you must first access the TMS zl Module through the host switch’s
command-line interface (CLI), using one of the following access methods:
■ Serial session
■ Telnet session
■ Secure Shell (SSH) session
To establish a serial connection with the switch, use the serial cable that was shipped with the
switch to connect a workstation to the switch. Then, run terminal session software such as
Tera Term or HyperTerminal on your workstation, and set the following parameters for the
session:
If you are prompted for a password when you access the host switch’s CLI, enter the password
for the manager user.
• Baud rate = 9600 • Stop bits = 1
• Parity = None • Flow control = None
• Data bits = 8