<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="22573" language="de" source="https://portal.flane.ch/swisscom/xml-course/gigamon-ilb+solutions" lastchanged="2025-11-07T15:49:11+01:00" parent="https://portal.flane.ch/swisscom/xml-courses"><title>Gigamon Inline Bypass: Designing and Implementing Inline Bypass</title><productcode>ILB SOLUTIONS</productcode><vendorcode>GG</vendorcode><vendorname>Gigamon</vendorname><fullproductcode>GG-ILB SOLUTIONS</fullproductcode><version>6.9</version><objective>&lt;p&gt;After completing this course, you will understand:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Understand the different uses for Classic and Flexible inline solutions&lt;/li&gt;&lt;li&gt;Learn design considerations important when implementing an inline bypass solution&lt;/li&gt;&lt;li&gt;Implement Classic and Flexible inline solutions&lt;/li&gt;&lt;li&gt;Understand how to implement inline resiliency&lt;/li&gt;&lt;li&gt;Learn best practices and how to overcome common challenges&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;&lt;strong&gt;Mandatory Requirement: &lt;/strong&gt;Customers must have knowledge of or have taken the &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/course/gigamon-gfd1&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Gigamon Foundations I: Insight into Network Data Across Your Network &lt;span class=&quot;fl-prod-pcode&quot;&gt;(GFD1)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; course before they take this one-day course. As a follow on course to the Gigamon Foundations I course, learners are expected to already possess these skills, abilities, and knowledge:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Data security protection and prevention fundamentals&lt;/li&gt;&lt;li&gt;Fundamentals of route switch technologies&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;The primary target audiences for the course are:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security Ops teams that need to understand how Gigamon Inline Bypass Solutions function in relation to designing and deploying solutions utilizing these features.&lt;/li&gt;&lt;li&gt;Network Ops teams that are familiar with Gigamon, and will be implementing a Classic or Flexible Inline Bypass solution. These include roles like architects, admins, and operators.&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;p&gt;&lt;strong&gt;Module 1: Gigamon Solution Overview&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network Packet Broker concepts&lt;/li&gt;&lt;li&gt;Gigamon Platform&lt;/li&gt;&lt;li&gt;Inline Bypass module options&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 2: Inline Bypass Overview&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Inline Solutions: Tools and Challenges Overview&lt;/li&gt;&lt;li&gt;Inline Bypass Benefits&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 3: Inline Bypass Foundations&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Inline Bypass Design Considerations&lt;/li&gt;&lt;li&gt;Explicit versus Implicit Inline Behavior&lt;/li&gt;&lt;li&gt;Asymmetric Traffic&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 4: Classic Inline Bypass Overview (with Lab)&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Inline Monitoring and Configurations&lt;/li&gt;&lt;li&gt;Monitoring Multiple Links&lt;/li&gt;&lt;li&gt;Traffic Paths&lt;/li&gt;&lt;li&gt;Protected versus Unprotected&lt;/li&gt;&lt;li&gt;Traffic Forwarding and Inline Inspection&lt;/li&gt;&lt;li&gt;Tool Operation Validation&lt;/li&gt;&lt;li&gt;Tool Group Redundancy&lt;/li&gt;&lt;li&gt;Tool Failover Configurations&lt;/li&gt;&lt;li&gt;Inline Configuration Examples&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 5: Flexible Inline Bypass Overview&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Flexible Inline Bypass Features&lt;/li&gt;&lt;li&gt;Flexible Inline Bypass Fundamentals&lt;/li&gt;&lt;li&gt;Flexible Inline Bypass Design Discussion&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 6: Designing and implementing Resilient Inline Bypass solutions&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Redundant Inline Network Architectures&lt;/li&gt;&lt;li&gt;Gigamon Resilience for Inline Protection (GRIP) Configuration&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>After completing this course, you will understand:



- Understand the different uses for Classic and Flexible inline solutions
- Learn design considerations important when implementing an inline bypass solution
- Implement Classic and Flexible inline solutions
- Understand how to implement inline resiliency
- Learn best practices and how to overcome common challenges</objective_plain><essentials_plain>Mandatory Requirement: Customers must have knowledge of or have taken the Gigamon Foundations I: Insight into Network Data Across Your Network (GFD1) course before they take this one-day course. As a follow on course to the Gigamon Foundations I course, learners are expected to already possess these skills, abilities, and knowledge:



- Data security protection and prevention fundamentals
- Fundamentals of route switch technologies</essentials_plain><audience_plain>The primary target audiences for the course are:



- Security Ops teams that need to understand how Gigamon Inline Bypass Solutions function in relation to designing and deploying solutions utilizing these features.
- Network Ops teams that are familiar with Gigamon, and will be implementing a Classic or Flexible Inline Bypass solution. These include roles like architects, admins, and operators.</audience_plain><outline_plain>Module 1: Gigamon Solution Overview


- Network Packet Broker concepts
- Gigamon Platform
- Inline Bypass module options
Module 2: Inline Bypass Overview


- Inline Solutions: Tools and Challenges Overview
- Inline Bypass Benefits
Module 3: Inline Bypass Foundations


- Inline Bypass Design Considerations
- Explicit versus Implicit Inline Behavior
- Asymmetric Traffic
Module 4: Classic Inline Bypass Overview (with Lab)



- Inline Monitoring and Configurations
- Monitoring Multiple Links
- Traffic Paths
- Protected versus Unprotected
- Traffic Forwarding and Inline Inspection
- Tool Operation Validation
- Tool Group Redundancy
- Tool Failover Configurations
- Inline Configuration Examples
Module 5: Flexible Inline Bypass Overview



- Flexible Inline Bypass Features
- Flexible Inline Bypass Fundamentals
- Flexible Inline Bypass Design Discussion
Module 6: Designing and implementing Resilient Inline Bypass solutions



- Redundant Inline Network Architectures
- Gigamon Resilience for Inline Protection (GRIP) Configuration</outline_plain><duration unit="d" days="1">1 Tag</duration><pricelist><price country="DE" currency="USD">995.00</price><price country="US" currency="USD">995.00</price><price country="IT" currency="EUR">840.00</price><price country="GB" currency="GBP">850.00</price><price country="IL" currency="USD">995.00</price><price country="CA" currency="CAD">1375.00</price><price country="CH" currency="CHF">995.00</price></pricelist><miles/></course>