The management of security, operations and services in large scale enterprise networks is becoming more difficult due to complex security policies of the organizations and also due to dynamic changes in network topologies. Typically, the global security policy of an enterprise network is implemented in a
distributed fashion through appropriate sets of access control rules (ACL rules) across various interface switches (layer 3 switches) in the network. In such networks, verification of the ACL implementations with respect to the security policies is a major technical challenge to the network administrators. This is
difficult to achieve manually, because of the complex policy constraints (temporal access constraints)and the presence of hidden access paths in the network which may in turn violate one or more policy rules implicitly. The inconsistent hidden access paths may be formed due to transitive relationships
between implemented service access paths in the network. Moreover, the c