Skip to main content

Secure Inline Packet Broker Deployment Best Practice

written by Asterfuison

March 6, 2026

Introduction

In previous articles, such as Network Packet Broker Powered by SONiC: PB-APP Solution, we introduced Asterfusion’s packet broker platform. It supports full-rate interfaces from 1G to 800G.

This article discusses best practices for inline packet broker deployment to maximize network security.

open-packet-broker-family-products

What is Packet Broker ?

First, let’s review the definition of a packet broker. A packet broker, also called an NPB (Network Packet Broker), acts as an intelligent intermediary. It performs traffic filtering, replication, and aggregation. It then distributes the required traffic to backend tools with precision, improving tool utilization.

A key characteristic of Asterfusion’s new-generation packet broker is that it runs as containerized software on a switch, based on the SONiC operating system. Unlike traditional standalone NPB appliances, it integrates switch functionality with NPB capabilities.

Why Do We Need Inline Packet Broker Deployment?

Inline-Packet-Broker-Deployment-schematic-dia

Traditional out-of-band deployment has clear limitations. It can only monitor traffic passively and cannot perform complex traffic filtering.

In an inline deployment, the NPB sits between the source and destination. It can actively process traffic, such as dropping or modifying packets. This differs from the traditional out-of-band model, which only allows passive analysis.

The need for inline deployment is mainly reflected in the following aspects:

  1. Address the limitations of out-of-band monitoring In out-of-band mode, the NPB cannot affect the original traffic. If abnormal packets must be blocked or modified, inline deployment is required.
  2. Improve backend tool efficiency Through traffic filtering, replication, and aggregation, only the required traffic is delivered to backend tools. This avoids unnecessary resource consumption.
  3. Enable active attack mitigation Once attack signatures are detected, packets can be dropped or blocked immediately.

Key Technologies in Inline Packet Broker Deployment

In an inline packet broker deployment, several key technologies are used to achieve fine-grained traffic management.

  1. ACL Rules

Unlike traditional switch ACLs that are mainly used to block traffic, ACLs on a packet broker are used for traffic selection.

Traffic can be filtered based on fields such as VLAN, IP address, and port number. The selected traffic is then marked and forwarded. This enables a complete workflow of traffic selection, tagging, and distribution.

  1. VLAN Tagging

In this scenario, VLAN is not used for broadcast domain segmentation. It is used as a traffic label.

The VLAN tag identifies the source port of the traffic. For example, traffic from port A can be tagged with VLAN 101. Backend tools can identify the VLAN tag and return the processed traffic to the correct link. The VLAN tag is removed before the traffic re-enters the production network to avoid service impact.

  1. Load Balancing

Three load balancing modes are supported: static, resilient, and active/standby. These modes ensure traffic continuity if a backend tool port fails.

The resilient mode is recommended. It redistributes only the traffic from the failed device. Traffic on other devices remains unchanged. This minimizes the impact on running tools.

Inline-Packet-Broker-Deployment-load-balance
  1. High Availability Design

High availability is a key requirement for inline packet broker deployment.

In addition to link aggregation (LAG) redundancy, the following mechanisms improve reliability:

  • Built-in bypass forwarding templates: when a LAG interface goes down, a predefined template is activated automatically to keep traffic forwarding.
  • High-priority traffic bypass: routing protocol frames, such as EtherType 0x8809 and 0x88CC, are forwarded directly. They bypass DPI or other inspection devices. This ensures reliable delivery of controlled traffic.

The NPB forwarding pipeline is simple and efficient. It is different from traditional switches that rely on MAC learning and routing protocols.

Packet forwarding is entirely rule-based. The administrator only defines the ingress port, ACL processing policy, and egress port. Traffic can then be forwarded precisely.

This protocol-independent model provides high flexibility. It is well suited for complex traffic steering scenarios and significantly improves traffic management efficiency and response time.

Typical Network Topology and Configuration

Inline-Packet-Broker-Deployment-simplified-topo

Network Architecture:

The NPB is deployed inline on the original link, such as between ISP1 and ISP2, with a bypass device added.

If the NPB fails or undergoes an upgrade, the system automatically triggers bypass switching. This ensures that the original traffic continues uninterrupted, providing telecom-grade reliability.

Therefore, the traffic flow is: Source → Bypass → NPB → Backend Tool (e.g., DPI) → NPB → Destination

Inline-Packet-Broker-Deployment-simplified-topo-2

Key Configuration Points:

  1. High-Priority Traffic Bypass: Traffic that does not require analysis, such as routing protocol frames, is forwarded directly. This prevents abnormal processing by backend DPI devices.
Inline-Packet-Broker-Deployment-high-priority
Inline-Packet-Broker-Deployment-high-priority-config

2. LAG (Link Aggregation): Create a LAG group and add the physical ports connected to the DPI device. This ensures load balancing and automatic failover.

Inline-Packet-Broker-Deployment-lag
Inline-Packet-Broker-Deployment-lag-config

3. Low-Priority Traffic to DPI: Traffic that requires DPI processing is tagged with a dedicated VLAN (e.g., traffic from port C1 tagged with VLAN 101). The VLAN is used for traffic direction identification. After processing, the VLAN tag is removed to avoid impacting the original service.

Inline-Packet-Broker-Deployment-low-priority
Inline-Packet-Broker-Deployment-low-priority-config

4. DPI Return Traffic Handling: After DPI processing, traffic retains the original VLAN tag when returning to the NPB. Before forwarding to downstream ports, a pop-VLAN operation removes the tag, restoring the original traffic.

Inline-Packet-Broker-Deployment-dpi-return
Inline-Packet-Broker-Deployment-dpi-return-config

Operations and Monitoring

You can use the commands below to check and verify the system’s status and operation:

Quick Reference for Common Commands

OperationCLI Command
View interface statusshow interface status
View aggregated interface statusshow link-aggregation summary
View interface countersshow counters interface
Clear interface countersclear counters interface

ACL Rule Commands

OperationCLI Command
View ACL hit statisticsshow counters acl
Clear ACL hit statisticsclear counters acl
View all current configurationsshow running-config

Conclusion

In today’s landscape of complex traffic management and evolving security threats, Inline Packet Broker Deployment stands as a critical solution for the modern enterprise. By moving beyond the limitations of traditional out-of-band monitoring, this approach empowers organizations to achieve active traffic intervention while maintaining peak operational efficiency.

Please login to request a quote

Key Strategic Benefits:

  • Optimized Resource Utilization: Precisely filters and distributes only the necessary traffic to backend tools, eliminating resource waste and extending the lifespan of your security stack.
  • Enhanced Business Reliability: Integrated high-availability designs and specialized bypass functions ensure zero service interruption, even during maintenance or tool failure.
  • Proactive Security Defense: Enables real-time, active traffic manipulation to identify and mitigate threats before they penetrate the core network.
  • Reduced Total Cost of Ownership (TCO): Aside from the external bypass hardware, essential reliability features are built directly into the packet broker, significantly lowering long-term capital and operational expenses.

Whether you are looking to harden your infrastructure against sophisticated attacks or streamline your traffic orchestration, Inline Packet Broker Deployment provides the necessary balance of maximum security, high reliability, and cost-effectiveness to safeguard your network’s future.

Have a project in mind? Request a proposal from our sales team at bd@cloudswit.ch

Contact US !

Latest Posts