<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Bypass Interface for IPS 4200 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bypass-interface-for-ips-4200/m-p/1685318#M56524</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can somebody help me how IPS bypass interface module for 4200 is used? Is it that, when IPS appliance fails (no power, hardware failure), traffic can readily flow from outside interface to inside bypassing the IPS? Usually in inline placement, IPS appliance is the point of failure during hardware failure, is the bypass module introduced to defy such failure?&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 12:25:51 GMT</pubDate>
    <dc:creator>iskoy.istem</dc:creator>
    <dc:date>2019-03-10T12:25:51Z</dc:date>
    <item>
      <title>Bypass Interface for IPS 4200</title>
      <link>https://community.cisco.com/t5/network-security/bypass-interface-for-ips-4200/m-p/1685318#M56524</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can somebody help me how IPS bypass interface module for 4200 is used? Is it that, when IPS appliance fails (no power, hardware failure), traffic can readily flow from outside interface to inside bypassing the IPS? Usually in inline placement, IPS appliance is the point of failure during hardware failure, is the bypass module introduced to defy such failure?&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-interface-for-ips-4200/m-p/1685318#M56524</guid>
      <dc:creator>iskoy.istem</dc:creator>
      <dc:date>2019-03-10T12:25:51Z</dc:date>
    </item>
    <item>
      <title>Bypass Interface for IPS 4200</title>
      <link>https://community.cisco.com/t5/network-security/bypass-interface-for-ips-4200/m-p/1685319#M56531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The bypass module is only available on the 4260 and 4270 sensors. It can give you a hardware short of the Ethernet pairs in the event of a sensor power failure. The rest of the sensor product line uses a software bypass. We have found both of these methods to be less then reliable when a sensor experiences a software crash (the software need to realize the sensing app has crashed in order to activate the bypass). Using an external device has proven to be much more reliable.&lt;/P&gt;&lt;P&gt;A simple switch, with two VLANS can be used. Connect the two VLANS externally with your sensor and a patch cable. Assign a higher Spanning Tree Protocol cost to the cable connecting your two VLANS. The cable becomes a hot standby path to your sensor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 13:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-interface-for-ips-4200/m-p/1685319#M56531</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2011-07-28T13:50:56Z</dc:date>
    </item>
  </channel>
</rss>

