TMS zl Management and Configuration Guide ST.1.1.100226
1-25
Overview
Deployment Options for Routing Mode—Threat Protection
Figure 1-9. Perimeter Deployment of the TMS zl Module
Deployment Tasks for Perimeter Threat Protection
You must complete these tasks to deploy your TMS zl Module to provide
perimeter threat protection:
1. As you deploy the TMS zl Module, you may cause network outages. You
should complete the following steps when the network is inactive.
2. Install the TMS zl Module in a ProCurve 5400zl or 8200zl switch, preferably
near the perimeter between the private and the external network.
3. For a TMS zl Module that is intended to provide perimeter protection
exclusively, the TMS VLANs should typically include:
• One VLAN on which the TMS zl Module connects to an external router
• One or more VLANs on which the TMS zl Module connects to the
internal network
Verify that the host switch supports these VLANs.