Gigamon Designing and Implementing Inline Bypass Solutions

The Gigamon Visibility and Analytics Fabric is an essential element in any monitoring or security strategy. This 1-day course focuses how to best design and implement the Gigamon Inline Bypass Solution. Training is conducted through comprehensive discussions, real-world use cases, and practical hands-on labs. If you are planning on implementing Classic or Flexible inline solutions as part of your Gigamon deployment, this is a great additional day of training to help you achieve success.

Days : 1
Price :




Who should attend

The primary target audiences for the course are:

  • Security Ops teams that need to understand how Gigamon Inline Bypass Solutions function in relation to designing and deploying solutions utilizing these features.
  • Network Ops teams that are familiar with Gigamon, and will be implementing a Classic or Flexible Inline Bypass solution. These include roles like architects, admins, and operators.


Mandatory Requirement: Customers must have knowledge of or have taken the Gigamon Foundations I: Insight into Network Data Across Your Network (GFD1) course before they take this one-day course. As a follow-on course to the Gigamon Foundations I course, learners are expected to already possess these skills, abilities, and knowledge:

  • Basic Flow Mapping
  • GigaVUE-FM Navigation

Course Objectives

  • Understand the different uses for Classic and Flexible inline solutions
  • Learn design considerations important when implementing an inline bypass solution
  • Implement Classic and Flexible inline solutions
  • Understand how to implement inline resiliency
  • Learn best practices and how to overcome common challenges

Outline: Gigamon Designing and Implementing Inline Bypass Solutions (ILB SOLUTIONS)

Module 1: Gigamon Solution Overview

  • Network Packet Broker concepts
  • Gigamon Platform
  • Inline Bypass module options

Module 2: Inline Bypass Overview

  • Inline Solutions: Tools and Challenges Overview
  • Inline Bypass Benefits

Module 3: Inline Bypass Foundations

  • Inline Bypass Design Considerations
  • Explicit versus Implicit Inline Behavior
  • Asymmetric Traffic

Module 4: Classic Inline Bypass Overview (with Lab)

  • Protected versus Unprotected
  • Traffic Paths
  • Tool Failure Detection
  • Failover Options
  • Inline Mapping Examples

Module 5: Flexible Inline Bypass Overview

  • Flexible Inline Bypass Features
  • Flexible Inline Bypass Design Discussion

Module 6: Designing and implementing Resilient Inline Bypass solutions

  • Redundant Inline Network Architectures
  • Gigamon Resilience for Inline Protection (GRIP) Configuration