10
Configuring Security and Access
568
Voyager Reference Guide
The following table describes these effects for algorithm invocation for a
single item or an item at the end of the list.
Creating a Service Module Example
In creating a new service, there are unique requirements for authentication,
accounting and session management, as follows:
Control
Description
required
The result is retained and the next algorithm is invoked.
requisite
A result of failure is reported immediately and no further algorithms are
invoked.
sufficient
If no previous algorithm has reported failure, a result of success is
reported immediately and no further algorithms are invoked;
a result of failure for this algorithm is discarded;
if a previous algorithm has reported failure or the result of this algorithm
is failure, the next algorithm is invoked.
optional
A result of failure is ignored and a result of success is retained;
the next algorithm is always invoked.
Control
Description
required
The result is combined with the results of previous algorithms such that
any failure result causes failure to be reported.
requisite
The result is reported immediately.
sufficient
The result is reported immediately
optional
A result of success is reported.
Summary of Contents for Network Voyager
Page 1: ...Voyager Reference Guide Part No N450820002 Rev A Published December 2003 ...
Page 4: ...4 Voyager Reference Guide ...
Page 30: ...2 How to Use Voyager 30 Voyager Reference Guide ...
Page 32: ...3 Command Line Utility Files 32 Voyager Reference Guide ...
Page 220: ...5 Configuring Interfaces 220 Voyager Reference Guide ...
Page 446: ...7 Configuring Traffic Management 448 Voyager Reference Guide ...
Page 618: ...10 Configuring Security and Access 620 Voyager Reference Guide ...
Page 668: ...14 Configuring IPv6 670 Voyager Reference Guide ...
Page 672: ...15 IPSO Process Management 674 Voyager Reference Guide ...
Page 700: ...Index 702 Voyager Reference Guide ...