TMS zl Management and Configuration Guide ST.1.0.090213

1-23
Overview
Deployment Options for Routing Mode—Threat Protection
Figure 1-7. Perimeter Deployment of the TMS zl Module
Deployment Tasks for Perimeter Threat Protection
You must complete these tasks to deploy your TMS zl Module to provide
perimeter threat protection:
1. As you deploy the TMS zl Module, you may cause network outages. You
should complete the following steps when the network is inactive.
2. Install the TMS zl Module in a ProCurve Series 5400zl switch or ProCurve
8212zl switch, preferably near the perimeter between the private and the
external network.
3. For a TMS zl Module that is intended to provide perimeter protection
exclusively, the TMS VLANs should typically include:
One VLAN on which the TMS zl Module connects to an external router
One or more VLANs on which the TMS zl Module connects to the
internal network
Verify that the host switch supports these VLANs.