HP ProCurve Threat Management Solution Implementation Guide 2009-05

4-28
HP ProCurve Network Immunity Manager with HP ProCurve Security Devices
Step 2: Detect Threats
Figure 4-23. Sample Network
Once you associate a VLAN with a zone, it is called a TMS VLAN. The TMS zl Module filters
traffic that crosses a TMS VLAN boundary, but not traffic that is transmitted within the same
TMS VLAN.
Subtask: Access the TMS zl Module’s CLI
To begin the initial setup, you must first access the TMS zl Module through the host switch’s
command-line interface (CLI), using one of the following access methods:
Serial session
Telnet session
Secure Shell (SSH) session
To establish a serial connection with the switch, use the serial cable that was shipped with the
switch to connect a workstation to the switch. Then, run terminal session software such as
Tera Term or HyperTerminal on your workstation, and set the following parameters for the
session:
If you are prompted for a password when you access the host switch’s CLI, enter the password
for the manager user.
Baud rate = 9600 Stop bits = 1
Parity = None Flow control = None
Data bits = 8