Views:

Inspection Bypass – TippingPoint TPS (Threat Protection System) Devices

 

Overview

 

Inspection Bypass is a feature on TippingPoint TPS devices that routes specific, user-defined traffic through the IPS without inspection.  This capability is ideal for traffic that is latency-sensitive, trusted, encrypted, or operational in nature. Inspection Bypass operates at the BCM (switch) level, introducing virtually zero latency, and takes effect immediately once configured. 

 

Supported Platforms & Limitations

 

Inspection Bypass is:


  • Supported only on hardware TippingPoint TPS devices 

  • Not supported on vTPS devices 

  • 📝 Limited to 32 rules per TPS device (legacy IPS devices support a maximum of 8 rules) 

  •  

Key Benefit: Because inspection bypass occurs before traffic reaches the TPS inspection engine, bypassed traffic does not count against the throughput license, providing significant cost management benefits. 

 

 
 

Inspection Bypass vs. Traffic Management Filters (TMFs)

  Inspection Bypass Traffic Management Filters
Processing Location Switch-level (BCM) Engine-level
Latency Impact Virtually none, regardless of load Can increase latency under high load or attack
License Consumption ✅ No impact on inspection bandwidth license ❌ Consumes licensed bandwidth
Flexibility Less granular Highly granular and configurable
Number of Rules Needed 1 rule covers both directions 2–4 rules may be required
Configuration Scope Device-based Profile-based
Activation Immediate (no profile distribution) Requires profile distribution
 

 

 
 

 

Advantages of Inspection Bypass

 

  • Minimal latency – Switch-level processing ensures virtually zero latency

  • 💰 No license bandwidth consumption – Bypassed traffic doesn't count against throughput limits

  • 🚀 Immediate effect upon creation – Changes activate immediately without profile distribution

  • 📋 Simpler bidirectional handling – Single rule covers both directions

  •  

 

Limitations

 

  • ❌ Not supported on vTPS devices 

  • 📉 Legacy devices have reduced rule capacity (8 rules) 

  • 🎯 Limited flexibility compared to TMFs 

  • ⚠️ Requires careful rule design to avoid security gaps 

  •  
 

Common Use Cases

 

Organizations typically use Inspection Bypass for: 

 

1. Latency-Sensitive Traffic


  • Voice over IP (VoIP)

  • Real-time communications

  •  

2. Connectivity / Control Plane Traffic


  • BGP

  • BFD

  • VRRP

  • Other keepalive, routing, or heartbeat protocols

  •  

3. Non-Inspectable or Operational Traffic


  • VPN tunnels

  • Internal trusted traffic

  • SSL/TLS encrypted traffic (e.g., TCP/443)

  • Traffic where inspection is not feasible or beneficial

  •  

 

Configuration Overview

 

Inspection Bypass is device-based, meaning rules must be created directly on each TPS device that requires them.  No profile redistribution is required—changes apply immediately.

 

Accessing Inspection Bypass

 

In TippingPoint SMS, navigate to: Devices → All Devices 


  1. Select a device that supports Inspection Bypass

  2. Click Inspection Bypass

  3. Click New to create a rule or Edit to modify an existing one

  4.  

 

Creating or Editing an Inspection Bypass Rule

 

1. Name and Status 


  • Enter a unique, descriptive name

  • Enable or disable the rule

  • Note: The name is stored in SMS only; it does not appear on the managed device

  •  

2. Select an Action 

 

TippingPoint TPS devices support several actions:

Action Description
Bypass (default) Allows matching traffic to pass without inspection
Block Drops matching traffic
Redirect Sends traffic uninspected to a specified port
Ingress Mirror Copies pre-inspection traffic to another port
Egress Mirror Copies post-inspection traffic to another port
 
 

📝 Note: Mirror and Redirect actions require selecting a Target Port. Mirror actions support up to 4 MTP configurations. 

 

3. Configure Traffic Criteria 

 

Specify the matching conditions:


  • Ethernet Type: IP, Not IP, or protocol-specific

  • IP Protocol: TCP, UDP, or other

  • Source IP / Port: Specific IP, CIDR, or Any

  • Destination IP / Port: Specific IP, CIDR, or Any

  • Ports apply only for TCP/UDP

  •  
 

4. VLAN Match (Optional) 


  • Leave blank to match all VLANs

  • Specify a VLAN tag or range when needed

  • By default, VLAN, MPLS, and tunneling checks are not performed

  •  
 

5. Segment Selection 

 

Choose where the rule applies:


  • Select specific segments, or

  • Use Select All Segments (not recommended for Redirect/Mirror) *Please see Configuration Best Practices Section for additional details*

  •  
 

6. Complete the Wizard 

 

Click Finish to save the rule.

 
 

Advanced Actions: Redirect and Mirroring

 

Redirect 


  • Skips the inspection engine entirely

  • Sends traffic out a specified port uninspected

  • Common for service chaining or offloading traffic to another appliance

  •  

Ingress Mirror 


  • Copies traffic before inspection

  • Useful for evaluating raw incoming packets

  •  

Egress Mirror 


  • Copies traffic after inspection

  • Useful for validating inspection outcomes

  • VLAN tags are recorded in mirrored packets

  •  

💡 Troubleshooting Tip: Mirror both ingress and egress to separate ports to compare before/after inspection traffic.

 
 

Configuration Best Practices

 

1. Use Restrictive Criteria 


  • Avoid broad CIDRs unless absolutely necessary

  • Overly wide bypass rules introduce security risk

  •  

2. Port Pairing for Redirect/Mirror 


  • ⚠️ Do not use "Select All Segments" with Redirect/Mirror

  • Can overload the target port

  • Can create traffic loops

  • Always configure one-to-one source-to-target port pairs

  •  

3. Port Speed Compatibility 


  • Ensure the target port has equal or greater line speed than the source

  •  

4. Rule Count Management 


  • TPS devices: 32 rules

  • Legacy IPS devices: 8 rules

  • Prioritize rules based on operational impact and business needs

  •  

 

Monitoring and Statistics

 

Viewing Rule Statistics 

 

Each rule displays a packet counter showing how many packets match the rule.

 

Refresh or Clear Statistics 

 

Buttons at the bottom right allow you to:


  • Refresh counters

  • Clear counters for troubleshooting and validation

  •  

 

Inspection Bypass Rule Display Fields

Property Description
ID Rule index
Enabled Rule on/off status
Name Unique name (SMS-only)
Ethernet Type IP / Non-IP / Protocol-specific
IP Protocol TCP, UDP, or other
Statistics Packet match counter
Src IP / Src Port Source matching criteria
Dst IP / Dst Port Destination matching criteria
Action Bypass, Block, Redirect, Mirror options
Target Port Required for Redirect/Mirror actions
  
 
 

Summary Comparison

Aspect Inspection Bypass Traffic Management
Rules Required 1 2–4
Processing Level Switch Engine
Granularity Medium High
License Impact No Yes
Activation Immediate Requires distribution
Use Cases VoIP, BGP, VPN, encrypted flows Precise traffic control, rate-limiting
  
 
 

Getting Help

 

For advanced scenarios, complex rule interactions, or additional guidance, contact TippingPoint Technical Assistance or refer to the official TippingPoint TPS documentation for CLI-level details.