HP ProCurve Threat Management Solution Implementation Guide 2009-05
4-48
HP ProCurve Network Immunity Manager with HP ProCurve Security Devices
Step 2: Detect Threats
Figure 4-37. PCM+ <Module> > TMS-Firewall > Access Policies > Unicast Window
Subtask: Determine What Access Policies Are Needed and Configure Them. By
default, TMS zl Module denies all traffic unless you explicitly permit it. You should analyze the
traffic on your network and determine what should be allowed:
■ Between VLANs in the same zone
■ Between zones
■ Between Self and each zone
You might want to list all the traffic that you want to allow and all the traffic you want to deny,
using Table 4-5. After you list the access policies for each source zone and destination zone,
you can determine the order in which the access policies should be processed and assign each
one a priority number accordingly.
Table 4-5. Determine What Access Policies You Need to Create
Action From To Service Source Destination Priority