Mylinking™ Network Tap Bypass Switch ML-BYPASS-200

2*Bypass plus 1*Monitor Modular Design, 10/40/100GE Links, Max 640Gbps

Short Description:

How Mylinking™ Network Bypass Tap works once multiple physical Inline Network Security Tools failures?

Changed the inline deployment mode of multiple security devices on the same link from “Physical Concatenation Mode” to “Physical Concatenation and Logical Concatenation Mode” to effectively reduce the single point of failure source on the concatenation link and improve the reliability of the link.

Mylinking™ Network Tap Bypass Switch is researched and developed to be used for flexible deployment of various types of serial security equipment while providing high network reliability.

Product Detail

Product Tags

Heartbeats Mode


By deploying Mylinking™ Smart Bypass Switch:

  • Users can flexibly install/uninstall security equipment and will not affect the current network and interrupt;
  • Mylinking™ Network Tap Bypass Switch with intelligent health detection function to real-time monitoring of the normal working state of the serial security device, once the serial security device work exception, the protection will automatically bypass to maintain the normal network communication;
  • Selective traffic protection technology can be used to deploy specific traffic cleaning security equipment, encryption technology based on the audit equipment. Effectively carry out the serial access protection for the specific traffic type, unloading the flow handling pressure of the series device;
  • Load Balanced Traffic Protection technology can be used for clustered deployment of secure serial devices to meet the need for serial security in high-bandwidth environments.

With the rapid development of the Internet, the threat of network information security is becoming more and more serious, so a variety of information security protection applications are used more and more widely. Whether it is traditional access control equipment (firewall) or a new type of more advanced protection means such as intrusion prevention system (IPS),Unified threat management platform (UTM), Anti-denial service attack system (Anti-DDoS), Anti-span Gateway, Unified DPI Traffic Identification and Control System, and many security devices are deployed in series in the network key nodes, the implementation of the corresponding data security policy to identify and deal with legal / illegal traffic. At the same time, however, the computer network will generate a large network delay or even network disruption in the case of fail over, maintenance, upgrade, equipment replacement and so on in a highly reliable production network application environment, users cannot stand it.

product description4

2-Network Tap Bypass Switch Advanced Features and Technologies

Mylinking™ “SpecFlow” Protection Mode and “FullLink” Protection Mode Technology
Mylinking™ Fast Bypass Switching Protection Technology
Mylinking™ “LinkSafeSwitch” Technology
Mylinking™ “WebService” Dynamic Strategy Forwarding/Issue Technology
Mylinking™ Intelligent Heartbeat Message Detection Technology
Mylinking™ Definable Heartbeat Messages Technology
Mylinking™ Multi-link Load Balancing Technology
Mylinking™ Intelligent Traffic Distribution Technology
Mylinking™ Dynamic Load Balancing Technology
Mylinking™ Remote Management Technology(HTTP/WEB, TELNET/SSH, “EasyConfig/AdvanceConfig” Characteristic)

3-Network Tap Bypass Switch Configuration Guide

BYPASS Protection Port Module Slot:
This slot can be inserted into BYPASS protection port module with different speed/port number. By replacing different types of modules, it can support BYPASS protection of multiple 10G/40G/100G links.

product description5

product description6

MONITOR Port Module Slot;
This slot can be inserted into the MONITOR port module with different speeds/ports. It can support multiple 10G/40G/100G link online serial monitoring device deployment by replacing different models.

product description7

Module Selection Rules
Based on different deployed links and monitoring equipment deployment requirements, you can flexibly choose different module configurations to meet your actual environment needs; please follow the following rules when selecting:
1. The chassis components are mandatory and you must select the chassis components before you select any other modules. At the same time, please choose different power supply methods (AC/DC) according to your needs.
2. The whole machine supports up to 2 BYPASS module slots and 1 MONITOR module slot; you can't select more than the number of slots to configure. Based on the combination of the number of slots and the module model, the device can support up to four 10GE link protections; or it can support up to four 40GE links; or it can support up to one 100GE link.
3. The module model "BYP-MOD-L1CG" can only be inserted into SLOT1 to work properly.
4. The module type "BYP-MOD-XXX" can only be inserted into the BYPASS module slot; the module type "MON-MOD-XXX" can only be inserted into the MONITOR module slot for normal operation.

Product Model

Function parameters


ML-BYPASS-M200 1U standard 19-inch rackmount; maximum power consumption 250W; modular BYPASS protector host; 2 BYPASS module slots; 1 MONITOR module slot; AC and DC optional;


BYP-MOD-L2XG(LM/SM) Supports 2-way 10GE link serial protection, 4*10GE interface, LC connector; built-in optical transceiver; optical link single/multimode optional, supports 10GBASE-SR/ LR;
BYP-MOD-L2QXG(LM/SM) Supports 2-way 40GE link serial protection, 4*40GE interface, LC connector; built-in optical transceiver; optical link single/multimode optional, supports 40GBASE-SR4/ LR4;
BYP-MOD-L1CG (LM/SM) Supports 1 channel 100GE link serial protection, 2*100GE interface, LC connector; built-in optical transceiver; optical link single multimode optional, supports 100GBASE-SR4/LR4 ;


MON-MOD-L16XG 16*10GE SFP+ monitoring port module; no optical transceiver module;
MON-MOD-L8XG 8*10GE SFP+ monitoring port module; no optical transceiver module;
MON-MOD-L2CG 2*100GE QSFP28 monitoring port module; no optical transceiver module;
MON-MOD-L8QXG 8* 40GE QSFP+ monitoring port module; no optical transceiver module;

4-Network TAP Bypass Switch Specifications

Product Modality

ML-BYPASS-M200 serial Bypass Switch

Type of Interface

MGT Interface

1*10/100/1000BASE-T Adaptive management interface; Support remote HTTP/IP management

Module Slot

2*BYPASS module slot;1*MONITOR module slot;

Links supporting maximum

Device support maximum 4*10GE links or 4*40GE links or 1*100GE links

Monitor Device support maximum 16*10GE monitoring ports or 8*40GE monitoring ports or 2*100GE monitoring ports;


Full duplex processing ability


Based on IP/protocol/port five tuple specific traffic cascade protecting


Cascade protection based on full traffic


Multiple load balancing


Custom heartbeat detecting function


Support Ethernet package independence




BYPASS Switch without flash










SYSLOG protocol


User authorization

Based on password authorization/AAA/TACACS+


Rated supply voltage


Rated power frequency


Rated input current

AC-3A / DC-10A

Rated Power



Working Temperature


Storage temperature


Working humidity

10%-95%, No condensation

User configuration

Console configuration

RS232 interface,115200,8,N,1

Out of band MGT interface

1*10/100/1000M Ethernet interface

Password authorization


Chassis Height

Chassis space(U)

1U 19 inch,485mm*44.5mm*350mm

5-Network TAP Bypass Switch Application(as following)

The following is a typical IPS (Intrusion Prevention System), FW (Firewall) deployment mode, IPS / FW is deployed in series to the network equipment (routers, switches, etc.) between the traffic through the implementation of security checks, according to the corresponding security policy to determine the release or blocking the corresponding traffic, to achieve the effect of security defense.


At the same time, we can observe IPS / FW as a serial deployment of the equipment, usually deployed in the key location of the enterprise network to implement serial security, the reliability of its connected devices directly affect the overall enterprise network availability. Once the serial devices overload, crash, software updates, policy updates, etc., the entire enterprise network availability will be greatly affected. At this point, we only through the network cut, physical bypass jumper can make the network to be restored, seriously affecting the reliability of the network. IPS / FW and other serial devices on one hand improve the deployment of enterprise network security, on the other hand also reduces the reliability of enterprise networks, increasing the risk of the network is not available.

5.2 Inline Link Series Equipment Protection

product description16

Mylinking™ " Bypass Switch " is deployed in series between network devices (routers, switches, etc.), and the data flow between network devices no longer leads directly to IPS / FW, " Bypass Switch " to IPS / FW, when the IPS / FW due to overload, crash, software updates, policy updates and other conditions of failure, the "Bypass Switch" through intelligent heartbeat message detection Function of the timely discovery, and thus skip the faulty device, without interrupting the premise of the network, the rapid network equipment directly connected to protect the normal communication network; when the IPS / FW failure recovery, but also through intelligent heartbeat packets Detection of timely detection of the function, the original link to restore the security of enterprise network security checks.

Mylinking™ "Bypass Switch" has a powerful intelligent heartbeat message detection function, the user can customize the heartbeat interval and the maximum number of retries, through a custom heartbeat message on the IPS / FW for health testing, such as send the heartbeat check message to the upstream / downstream port of IPS / FW, and then receive from the upstream / downstream port of IPS / FW, and judge whether the IPS / FW is working normally by sending and receiving the heartbeat message.

5.3 “SpecFlow” Policy Flow Inline Traction Series Protection

product description1

When the security network device only needs to deal with the specific traffic in series security protection, through the Mylinking™ " Bypass Switch " traffic per-processing function, through the traffic screening strategy to connect the security device " Concerned "traffic is sent back directly to the network link, and the" concerned traffic section "is traction to the in-line safety device to perform safety checks. This will not only maintain the normal application of the safety detection function of the safety device, but also reduce the inefficient flow of the safety equipment to deal with the pressure; at the same time, the " Bypass Switch " can detect the working condition of the safety device in real time. The safety device works abnormally bypasses the data traffic directly to avoid disruption of network service.

The Mylinking™ Traffic Bypass Protector can identify traffic based on the L2-L4 layer header identifier, such as VLAN tag, source / destination MAC address, source IP address, IP packet type, transport layer protocol port, protocol header key tag, and so on. A variety of matching conditions flexible combination can be defined flexibly to define the specific traffic types that are of interest to a particular security device and can be widely used for the deployment of special security auditing devices (RDP, SSH, database auditing, etc.).

5.4 Load balanced Series Protection

product description13

The Mylinking™ "Bypass Switch" is deployed in series between network devices (routers, switches, etc.). When a single IPS / FW processing performance is not sufficient to cope with network link peak traffic, The traffic load balancing function of the protector, the "bundling" of multiple IPS / FW cluster processing network link traffic, can effectively reduce the single IPS / FW processing pressure, improve the overall processing performance to meet the high bandwidth of the deployment environment Claim.

Mylinking™ "Bypass Switch" has a powerful load balancing function, according to the frame VLAN tag, MAC information, IP information, port number, protocol and other information on the Hash load balancing distribution of traffic to ensure that each IPS / FW received data flow Session integrity.

5.5 Multi-series Inline Equipment Flow Traction Protection (Change Serial Connection to Parallel Connection)
In some key links (such as Internet outlets, server area exchange link) location is often due to the needs of security features and the deployment of multiple in-line security testing equipment (such as firewall, anti-DDOS attack equipment, WEB application firewall, intrusion prevention Equipment, etc.), multiple security detection equipment at the same time in series on the link to increase the link of a single point of failure, reducing the overall reliability of the network. And in the above-mentioned security equipment on-line deployment, equipment upgrades, equipment replacement and other operations, will cause the network for a long time service interruption and a larger project cut action to complete the successful implementation of such projects.

By deploying the "Bypass Switch" in a unified manner, the deployment mode of multiple security devices connected in series on the same link can be changed from "physical concatenation mode" to "physical concatenation, logical concatenation mode" The link on the link of a single point of failure to improve the reliability of the link, while the "bypass switch" on the link flow on demand traction, to achieve the same flow with the original mode of safe processing effect.

More than one security device at the same time in series deployment diagram:


Mylinking™ Network TAP Bypass Switch Deployment Diagram:

product description15

5.6 Based on the Dynamic Strategy of Traffic Traction Security Detection Protection
"Bypass Switch" Another advanced application scenario is based on the dynamic strategy of traffic traction security detection protection applications, the deployment of the way as shown below:

product description14

Take the "Anti-DDoS attack protection and detection" security testing equipment, for example, through the front-end deployment of " Bypass Switch " and then anti-DDOS protection equipment and then connected to the " Bypass Switch ", in the usual " Traction protector "to the full amount of traffic wire-speed forwarding at the same time the flow mirror output to the" anti-DDOS attack protection device ", once detected for a server IP (or IP network segment) after the attack," anti-DDOS attack protection device " will generate the target traffic flow matching rules and send them to the " Bypass Switch " through the dynamic policy delivery interface. The " Bypass Switch " can update the "traffic traction dynamic" after receiving the dynamic policy rules Rule pool "and immediately" rule hit the attack server traffic "traction to the" anti-DDoS attack protection and detection "equipment for processing, to be effective after the attack flow and then re-injected into the network.

The application scheme based on the " Bypass Switch " is easier to implement than the traditional BGP route injection or other traffic traction scheme, and the environment is less dependent on the network and the reliability is higher.

"Bypass Switch" has the following characteristics to support dynamic policy security detection protection:
1, " Bypass Switch " to provide outside the rules based on WEBSERIVCE interface, easy integration with third-party security devices.
2, " Bypass Switch " based on the hardware pure ASIC chip forwarding up to 10Gbps wire-speed packets without blocking switch forwarding, and "traffic traction dynamic rule library" regardless of the number.
3, " Bypass Switch " built-in professional BYPASS function, even if the protector itself failure, can also bypass the original serial link immediately, does not affect the original link of normal communication.

  • Previous:
  • Next:

  • Write your message here and send it to us