<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

Are You Adding to Your Security Stack? Then Learn Chaining at the Edge

July 19, 2016

network security garland technology edgelens

Back in the early days of the 90's, before cybercrime really took off, no one really anticipated a need for a network to run more than two security appliances at the same time. That was then.

Here and now, cyber-threats are extremely serious business, and networks are larger than ever. IT Security teams have a growing number of inline and out-of-band tools within their security stack.

Meet the solution of today: Tool Chaining.

Not only are there more links to contend with—in this case, physical connections between a switch and a router—but there are far more security tools in the mix. In our other blog, (Four Roadblocks to Deploying a Full Stack of Inliine Security Appliances), we discussed the potential drawbacks that occur when too many appliances get in the way of network functionality.

>> Download now: Learn how to improve your IT security with better threat detection and prevention tool deployment.

Chaining, (aka daisy chaining) as it is called by network administrators, is a fundamental strategy that looks to secure the network edge. It is the solution for problems that arise when more than two in-line security appliances need to see the same data. Many security devices are wired into unified chains (taking the form of either a line or a circle). A network packet broker (NPB) system uses these unified chains to maximize network visibility. Not only does this visibility enhance the security of a network, it also allows administrators to catch the telltale signs of an impending network outage, and rectify them before anything comes unglued.

The Chaining Process with EdgeLens

Garland Technology's EdgeLens Chaining Multiple Security DevicesChaining isn't just a means to efficiency—it's necessary given our hardware device climate, in which the inherent limitations of SPAN port solutions have led to increased usage of a network TAP port alternative. Let's talk about what chaining looks like in practice:

  • All security appliances are connected to each other, and to a network packet broker (NBP), such as Garland's EdgeLens creating a unified visibility plane.
  • The NBP is the only appliance that actually sits in-line. When traffic enters the network, the NPB sends data packets through the in-line security appliance chain.
  • The traffic data passes through the chain, while being analyzed by each appliance in its turn. After the data is cleared, the NBP copies and stores it for forensic analysis at a later date, should that be necessary.
  • Full visibility allows administrators to monitor data packets both before and after they pass through the security stack, allowing them to troubleshoot network issues without negatively affecting traffic. In addition, archiving the traffic data. 

Supporting Chaining Strategies with Garland Technology

We don't just have the knowledge to help network professionals evade the perils and pitfalls of in-line security appliance deployment—Garland Technologies also has the hardware to back up our expertise. The EdgeLens® hybrid bypass TAP is a formidable enterprise security solution for administrators overseeing numerous in-line security appliances. Matching bypass TAP capabilities with intelligent packet brokering, EdgeLens will play a leading role within chained security stacks, emphasizing visibility and real-time monitoring both inline and out-of-band.

The network edge can seem like a dangerous place sometimes—but with Garland's winning approach to chaining, administrators will have unparalleled visibility into emergent threats.
 
Looking to add inline chaining solutions, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do.

IT security garland Technology tool deployment

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES