Skip to Content
Policy-Based Networking: Architecture and Algorithms
book

Policy-Based Networking: Architecture and Algorithms

by Dinesh C. Verma
November 2000
Intermediate to advanced content levelIntermediate to advanced
336 pages
8h 47m
English
Sams
Content preview from Policy-Based Networking: Architecture and Algorithms

Policy Constraint Validation

After the policies are specified as a set of rules, or as entries in a set of tables, they must be validated to ensure that they satisfy the syntactic and semantic constraints that are imposed on them by the usage scenario and the mechanisms used to describe the policies. These constraints can be of various types. They are discussed briefly in this section.

Syntax Validation

The first type of validation is to ensure that the syntax for policy specification is valid. Syntactic validation depends on the language that is used by a policy management tool to describe policies. The policies are input to the validation module in a descriptive format. This format is different among different management tools. Most often, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Transforming Campus Networks to Intent-Based Networking

Transforming Campus Networks to Intent-Based Networking

Pieter-Jan Nefkens
Storage and Network Convergence Using FCoE and iSCSI

Storage and Network Convergence Using FCoE and iSCSI

Sangam Racherla, Silvio Erdenberger, Harish Rajagopal, Kai Ruth

Publisher Resources

ISBN: 1578702267Purchase book