JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration Guide
search filter icon
search icon

Document Information

Preface

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

A.  Site Security Policy

B.  Using CDE Actions to Install Zones in Trusted Extensions

Associating Network Interfaces With Zones by Using CDE Actions (Task Map)

Specify Two IP Addresses for the System by Using a CDE Action

Specify One IP Address for the System by Using a CDE Action

Preparing to Create Zones by Using CDE Actions (Task Map)

Specify Zone Names and Zone Labels by Using a CDE Action

Creating Labeled Zones by Using CDE Actions (Task Map)

Install, Initialize, and Boot a Labeled Zone by Using CDE Actions

Resolve Local Zone to Global Zone Routing in Trusted CDE

Customize a Booted Zone in Trusted Extensions

Use the Copy Zone Method in Trusted Extensions

Use the Clone Zone Method in Trusted Extensions

C.  Configuration Checklist for Trusted Extensions

Glossary

Index

Creating Labeled Zones by Using CDE Actions (Task Map)

One zone can be created for every entry in the Trusted Network Zone Configuration database. You made the entries in Specify Zone Names and Zone Labels by Using a CDE Action, by running the Configure Zone action.

The Trusted_Extensions folder in the Application Manager contains the following actions that create labeled zones:

The tasks are completed in the following order.

Task
Description
For Instructions
1. Install and boot one zone.
Create the first labeled zone. Install the packages, make the zone an LDAP client, and start all services in the zone.
2. Customize the zone.
Remove unwanted services. If you plan to copy or clone the zone, remove zone-specific information.
3. Create the other zones.
Use one of the following methods to create the other zones. You chose the method in Make System and Security Decisions Before Enabling Trusted Extensions.
Create each zone from scratch.
Copy the first labeled zone to another label. Repeat for all zones.
Use a ZFS snapshot to clone the other zones from the first labeled zone.