Decryption Broker: Transparent Bridge Security Chain
Focus
Focus

Decryption Broker: Transparent Bridge Security Chain

Table of Contents
End-of-Life (EoL)

Decryption Broker: Transparent Bridge Security Chain

In a transparent bridge security chain network, all security chain devices are configured with two interfaces connected to the security chain network. These two interfaces are configured to be in Transparent Bridge mode; they do not have assigned IP addresses, subnet masks, default gateways, or local routing tables. Security chain devices in Transparent Bridge mode are serially connected, one after the other. They receive traffic on one interface, and then analyze and enforce the traffic. The traffic egresses the other interface and is passed to the next inline security chain device.The first image below shows a Transparent Bridge security chain deployment with a bidirectional session flow, and the second image shows a Transparent Bridge security chain with a unidirectional session flow. Configure Decryption Broker with a Single Transparent Bridge Security Chainto get started with either of these deployments.