TMS zl Management and Configuration Guide ST.1.0.090213
1-23
Overview
Deployment Options for Routing Mode—Threat Protection
Figure 1-7. Perimeter Deployment of the TMS zl Module
Deployment Tasks for Perimeter Threat Protection
You must complete these tasks to deploy your TMS zl Module to provide
perimeter threat protection:
1. As you deploy the TMS zl Module, you may cause network outages. You
should complete the following steps when the network is inactive.
2. Install the TMS zl Module in a ProCurve Series 5400zl switch or ProCurve
8212zl switch, preferably near the perimeter between the private and the
external network.
3. For a TMS zl Module that is intended to provide perimeter protection
exclusively, the TMS VLANs should typically include:
• One VLAN on which the TMS zl Module connects to an external router
• One or more VLANs on which the TMS zl Module connects to the
internal network
Verify that the host switch supports these VLANs.