TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 15
Figure 3: Perimeter Security Control Point
At this control point, as shown in Figure 3, the HP ProCurve Threat Management
Services zl Module can:
Restrict inbound traffic with the firewall feature to only that which is absolutely
necessary for the services and applications the organization wishes to intentionally
expose, perform NAT, and restrict outbound traffic determined necessary to conduct
business.
Inspect the traffic permitted to pass through with the intrusion detection / prevention
feature for malicious intrusion signatures and either report suspicious activity when
operating as an IDS or take preventive measures, such as logging and/or dropping
the suspicious packets, when operating as an IPS
Act as a Remote Access VPN Gateway for teleworkers or a site-to-site VPN
Gateway for connections to remote offices or business partners via tunnels through
the Internet