In the concise article "IBM Security XGS and network access control," IBM Threat Management Enablement Instructor Antonio Buffa details the basics of the IBM XGS 5100 appliance and shows you how it uses a Network Access Control policy -- comprised of rules, deployment parameters, and objects definitions -- to help administrators decide what to do when potentially threatening traffic has been detected. Buffa supplies a simple, conceptual, high-level information flow model that consists of three major elements -- who, what, and when:
- Who, to define objects created to distinguish identities.
- What, to inspect and interpret the data the application layer payload contains.
- When, to schedule actions based on defining time boundaries for events.