What is a bypass switch?

What is a bypass switch?

bypass switch (or bypass network TAP) is a simple piece of hardware that allows you to connect in-line security tools to your network – without the risk of network downtime. It provides a fail-safe access port for an in-line active security appliance such as an intrusion prevention system (IPS), next generation firewall (NGFW), etc.

Active, in-line security appliances are single points of failure in live computer networks because if the appliance loses power, experiences a software failure, or is taken off-line for updates or upgrades, traffic can no longer flow through the critical link. The bypass switch or bypass TAP removes this point of failure by automatically 'switching traffic via bypass mode' to keep the critical network link up. These switches safeguard a network with automated failover protection, preventing temporary tool outages from escalating into costly network outages.

A bypass switch has four ports. Two network ports create an in-line connection in the network link that is to be monitored. This connection is fully passive; if the bypass switch itself loses power, traffic continues to flow unimpeded through the link. Two monitor ports are used to connect the in-line monitoring appliance. During normal operation, the bypass switch passes all network traffic through the appliance as if it were directly in-line itself. But when the in-line appliance loses power, is disconnected, or otherwise fails the bypass switch passes traffic directly between its network ports, bypassing the appliance, and ensuring that traffic continues to flow on the network link.

Bypass switches can detect when an in-line tool has failed or lost power through heartbeat packets. Heartbeat packets are signals sent from the bypass switch, through the in-line tool at regular intervals. If a packet doesn’t make it back to the bypass switch, the in-line tool is assumed to have failed, and network traffic is rerouted.

Cubro Bypass Switches are deployed between network devices and in front of security tools, providing a reliable separation point between the network and security layers. They lead to comprehensive support of network and security tools without the risk of network interruptions. Bypass Switches enable multiple security tools to process traffic from a single network link.

Advantages of using Cubro external bypass switch:

  • Keeps network traffic flowing when the in-line appliance fails.
  • Allows the in-line appliance to be removed or serviced without impacting network traffic. For example, an IPS can be taken offline for upgrades, maintenance or troubleshooting
  • The in-line appliance can be moved from one network segment to another without impacting network traffic.


要查看或添加评论,请登录

Tamanna Bhatia的更多文章

  • From Visibility to Credibility

    From Visibility to Credibility

    With endless information available on the Internet and in social media, building credible visibility for oneself is…

  • The OSI Model

    The OSI Model

    The OSI (Open Systems Interconnection) Model was created based on recommendations from the International Organization…

  • Towards a more transparent network...

    Towards a more transparent network...

    In the recent years, the demand for network visibility tools has increased because they make existing monitoring tools…

  • Difference between Big Data and Meta Data

    Difference between Big Data and Meta Data

    A major service provider was not able to understand why on certain days they had more complaints from the customers and…

    1 条评论
  • 5 ways network visibility will impact enterprises

    5 ways network visibility will impact enterprises

    External Security - With every kind of new technology there are inherent security risks. Enterprises face risks of…

  • Introduction to VLANs

    Introduction to VLANs

    Virtual LANs (VLANs) allow network administrators to subdivide a physical network into separate logical broadcast…

  • Scalability in Network Architecture – Step Towards Future-proof Network Monitoring

    Scalability in Network Architecture – Step Towards Future-proof Network Monitoring

    There is a surge in the network traffic and no industry is immune to being overwhelmed by data. Network visibility is a…

  • Encrypted traffic SSL - Why network visibility matters for enterprises?

    Encrypted traffic SSL - Why network visibility matters for enterprises?

    SSL-encrypted traffic is a fast-growing portion of all enterprise traffic. According to several research studies…

  • Network visibility for monitoring

    Network visibility for monitoring

    Challenges with Conventional Monitoring: SPAN Ports contention (capture packet loss by over-subscription and CPU burden…

  • 5 ways network visibility will impact telecommunication sector

    5 ways network visibility will impact telecommunication sector

    Meta data will influence the network design and the network management The buzzword is a self-organizing network (SON).…

社区洞察

其他会员也浏览了