<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="22574" language="de" source="https://portal.flane.ch/swisscom/xml-course/gigamon-ssl+solutions" lastchanged="2025-11-07T15:49:25+01:00" parent="https://portal.flane.ch/swisscom/xml-courses"><title>Gigamon Inline SSL/TLS Decryption: Designing and Implementing Inline SSL/TLS Solutions</title><productcode>SSL SOLUTIONS</productcode><vendorcode>GG</vendorcode><vendorname>Gigamon</vendorname><fullproductcode>GG-SSL SOLUTIONS</fullproductcode><version>6.9</version><objective>&lt;ul&gt;
&lt;li&gt;Learn how Gigamon manages traffic flows where decryption of traffic is essential&lt;/li&gt;&lt;li&gt;Understand the different map group choices which support inline SSL/TLS decryption&lt;/li&gt;&lt;li&gt;Design and implement an inline SSL/TLS decryption solution&lt;/li&gt;&lt;li&gt;Learn best practices and common challenges&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;&lt;strong&gt;Mandatory Requirement:&lt;/strong&gt; Customers must have knowledge of or have taken the &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/course/gigamon-gfd1&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Gigamon Foundations I: Insight into Network Data Across Your Network &lt;span class=&quot;fl-prod-pcode&quot;&gt;(GFD1)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; course before they take this one-day follow-on course.&lt;/p&gt;
&lt;p&gt;It is also strongly recommended that learners have knowledge of or have taken the Gigamon Designing and Implementing Inline Bypass Solutions course. As a follow on course to the Gigamon Foundations I and Gigamon Designing and Implementing Inline Bypass Solutions courses, learners are expected to already possess these skills, abilities, and knowledge:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Basic Flow Mapping&lt;/li&gt;&lt;li&gt;GigaVUE-FM Navigation&lt;/li&gt;&lt;li&gt;Inline Bypass Concepts and Configuration&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;The primary target audiences for the course are:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security Ops teams that need to understand how Gigamon inline SSL/TLS decryption solutions function in relation to designing and deploying visibility solutions utilizing these features.&lt;/li&gt;&lt;li&gt;Network Ops teams that are familiar with Gigamon, and will be implementing a Classic or Flexible Inline Bypass solution with SSL/TLS decryption. These include roles like architects, admins, and operators.&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;p&gt;&lt;strong&gt;Module 1: Gigamon Solution Overview&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Gigamon Platform&lt;/li&gt;&lt;li&gt;Inline Bypass module options&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 2: SSL/TLS Technology Overvie&lt;/strong&gt;w
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SSL/TLS Overview&lt;/li&gt;&lt;li&gt;SSL/TLS Handshake Process&lt;/li&gt;&lt;li&gt;Understanding Private Keys and Certificates&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 3: Inline Decryption Challenges&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;NAT/PAT&lt;/li&gt;&lt;li&gt;Traffic Asymmetry&lt;/li&gt;&lt;li&gt;High Availability Solutions- Addressing Asymmetry&lt;/li&gt;&lt;li&gt;Resilient Inline Arrangement (RIA) &amp;ndash; Using Flexible Inline Bypass&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 4: Inline SSL Decryption Policy&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Monitoring SSL/TLS Traffic &amp;ndash; Out of Band versus Inline&lt;/li&gt;&lt;li&gt;Inbound versus Outbound Configurations&lt;/li&gt;&lt;li&gt;SSL/TLS Decryption Policy Parameters
&lt;ul&gt;
&lt;li&gt;Decrypt / No Decrypt Decisions&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;
&lt;li&gt;Configuring the Inline SSL/TLS Decryption Policy Profile&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 5: Inline Decryption Mapping Configurations&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Best Practice Inline SSL/TLS Mapping Configurations&lt;/li&gt;&lt;li&gt;Inbound TLS/SSL Decryption&lt;/li&gt;&lt;li&gt;Verifying TLS/SSL Decryption Configurations&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Learn how Gigamon manages traffic flows where decryption of traffic is essential
- Understand the different map group choices which support inline SSL/TLS decryption
- Design and implement an inline SSL/TLS decryption solution
- Learn best practices and common challenges</objective_plain><essentials_plain>Mandatory Requirement: Customers must have knowledge of or have taken the Gigamon Foundations I: Insight into Network Data Across Your Network (GFD1) course before they take this one-day follow-on course.

It is also strongly recommended that learners have knowledge of or have taken the Gigamon Designing and Implementing Inline Bypass Solutions course. As a follow on course to the Gigamon Foundations I and Gigamon Designing and Implementing Inline Bypass Solutions courses, learners are expected to already possess these skills, abilities, and knowledge:



- Basic Flow Mapping
- GigaVUE-FM Navigation
- Inline Bypass Concepts and Configuration</essentials_plain><audience_plain>The primary target audiences for the course are:



- Security Ops teams that need to understand how Gigamon inline SSL/TLS decryption solutions function in relation to designing and deploying visibility solutions utilizing these features.
- Network Ops teams that are familiar with Gigamon, and will be implementing a Classic or Flexible Inline Bypass solution with SSL/TLS decryption. These include roles like architects, admins, and operators.</audience_plain><outline_plain>Module 1: Gigamon Solution Overview



- Gigamon Platform
- Inline Bypass module options
Module 2: SSL/TLS Technology Overview



- SSL/TLS Overview
- SSL/TLS Handshake Process
- Understanding Private Keys and Certificates
Module 3: Inline Decryption Challenges



- NAT/PAT
- Traffic Asymmetry
- High Availability Solutions- Addressing Asymmetry
- Resilient Inline Arrangement (RIA) – Using Flexible Inline Bypass
Module 4: Inline SSL Decryption Policy



- Monitoring SSL/TLS Traffic – Out of Band versus Inline
- Inbound versus Outbound Configurations
- SSL/TLS Decryption Policy Parameters

- Decrypt / No Decrypt Decisions

- Configuring the Inline SSL/TLS Decryption Policy Profile
Module 5: Inline Decryption Mapping Configurations



- Best Practice Inline SSL/TLS Mapping Configurations
- Inbound TLS/SSL Decryption
- Verifying TLS/SSL Decryption Configurations</outline_plain><duration unit="d" days="1">1 Tag</duration><pricelist><price country="DE" currency="USD">995.00</price><price country="US" currency="USD">995.00</price><price country="IT" currency="EUR">840.00</price><price country="GB" currency="GBP">850.00</price><price country="IL" currency="USD">995.00</price><price country="CA" currency="CAD">1375.00</price><price country="CH" currency="CHF">995.00</price></pricelist><miles/></course>