TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 14
7.0 Common TMS Security Control Points
There are three common security control points where it is anticipated that many enterprise
environments will wish to deploy the HP ProCurve Threat Management Services zl Module:
1. At the perimeter of the enterprise network where it interfaces with the Internet and/or
business partner networks to protect from untrusted external networks
2. At the entry point to the data center where the data center interfaces with the rest of the
enterprise network to provide an extra layer of protection for the concentrated, high-value
information assets typically found within
3. At interface points between significant portions of the enterprise network (separate profit and
loss business units within a large corporation or geographical continents in a multinational
corporation) in order to provide granular access control and contain threat outbreaks within
the portion of the network that they originate
Note: A consideration when implementing the TMS zl Module in these scenarios is to
keep in mind the impact on the processing overhead of each layer of traffic examination.
As with any security product that performs active traffic inspection, the type and number
of functions enabled that traffic has to pass through has an impact on overall throughput.
Please refer to the current HP ProCurve Threat Management Services zl Module
Datasheet for performance and throughput specifications for the hardware and software
versions of the TMS zl Module being implemented. This type of information can be
obtained in the
HP ProCurve Reference Library.
7.1 Perimeter
This is the most common, almost traditional, placement of a security control like the HP
ProCurve Threat Management Services (TMS) zl Module.