In a transparent bridge security chain network, all
security chain devices are configured with two interfaces connected
to the security chain network. These two interfaces are configured
to be in Transparent Bridge mode; they do not have assigned IP addresses,
subnet masks, default gateways, or local routing tables. Security
chain devices in Transparent Bridge mode are serially connected,
one after the other. They receive traffic on one interface, and
then analyze and enforce the traffic. The traffic egresses the other
interface and is passed to the next inline security chain device.The
first image below shows a Transparent Bridge security chain deployment
with a bidirectional session flow, and the second image shows a
Transparent Bridge security chain with a unidirectional session
flow.
Configure
Decryption Broker with a Single Transparent Bridge Security Chainto
get started with either of these deployments.