PRODUCT SUPPORT ANNOUNCEMENT
Some videos and Web Editions may be returning errors on launch. Learn more.
Policy-based networking is the new frontier in networking. A high-level directive given to the network at a single console, it promises easy management of critical network elements such as security, Quality of Service, and device configuration. The translation of high level policies into the device specific configurations is a complex procedure, requiring detailed knowledge of the topology and routes in the network, and translation-enabling algorithms. This book would take the mystery out of this process, allowing you, the network engineer to build policy support into your network architecture. Only scattered pieces of the solution can currently be found in various IETF and DMTF working groups, or in some research presentations and workshops. In-depth understanding of the algorithms behind policy-based networking is necessary for network engineers/architects who want to create new products/applications that deliver policy features.
Click below for Sample Chapter related to this title:
Who Will Benefit from This Book? Who Is This Book Not For? How This Book Is Organized.
Policy and Network Management. Policy Disciplines. Policy Definition. Policy Application Examples. Policy Activity: A Historical Perspective. Policy Architecture Overview. Policy Management Tool. Policy Repository. Policy Decision Point. Policy Enforcement Point. An Implementation of the Architecture. Further Information.
IP Overview. Quality of Service Overview. IP Security Overview. Further Information.
Business Environments. High-Level Policies. Low-Level Policies. The Policy Management Tool.
Support of Business SLAs in the Enterprise Network. Extranet Support in the Enterprise Environment. SLA Support in the ISP Environment. VPN Support in the ISP Environment. SLA Support in the ASP Environment. Access Control Support in the ASP Environment.
Topology Discovery. PEP and PDP Discovery. Role and User Discovery. Application Discovery.
Policy Specification Languages. A Policy Case Example. Policy Constraint Validation. Policy Conflict Detection and Resolution. Policy Coverage Analysis. Discipline-Specific Policy Validation. Policy Translation: Conversion from High-Level to Low-Level.
An Example of Policy Distribution. Policy Distribution Using Management Frameworks. Policy Distribution Using Scripts. Policy Distribution Using LDAP. Policy Distribution Using SNMP. Policy Distribution Using Common Open Policy Service. Policy Distribution Using Web Servers. Summary.
Policy Enforcement Point Components. Classification Algorithms. Policy Validation Algorithms.
Enterprise SLA Support. Extranet Support for the Enterprise Environment. SLA Support for the ISP Environment. VPN Support for the ISP Environment. Customer Support for the Application-Hosting Environment.
Policy Monitoring. Dynamic and State-Dependent Policies. Routing Policy. Other Policy Disciplines. Interdomain Policies.