Chapter 8. Policy Enforcement Point Algorithms

Thus far in this book, we have looked at the algorithms and mechanisms that can be used at the policy management console and how they are distributed to the various devices. This short chapter looks at the algorithms and mechanisms that need to be implemented at the devices themselves in order to enforce compliance with those policies.

This chapter begins with a description of an abstract model of the device that actually enforces the policies specified by the management console. This is followed by a description of the set of algorithms that is appropriate when the policies need to be applied to the traffic flows passing through the device. Then we'll look at the various algorithms that can be used ...

Get Policy-Based Networking: Architecture and Algorithms now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.