Trusted Solaris Administration Overview

Administering Hosts and Networks

To administer hosts and networks, you need to open the Computers and Networks tool collection. A typical collection is shown in the view pane of the following figure.

Figure 2-9 Computers and Networks Tool Collection

Graphic

This gives you access to three tools:

Security Families Tool Set

A security family is a group of workstations that use a common networking protocol and have the same security requirements. As a result, you can apply the same template of network security attributes to them for the purpose of receiving and transmitting data. Trusted networking and templates are explained in more detail in Chapter 3, Administering Trusted Networking.

When the Security Families tool is opened, all available templates display as icons. You can modify either the templates or the host assignments as follows:

Figure 2-11 Modify Template Dialog Box

Graphic

The tabs in the Modify Template dialog box are described in the following table.

Table 2-4 Template Dialog Box Summary

Tab  

Description 

General  

Specifies templates, host types, and minimum/maximum labels.  

Access Control Attributes  

Specifies security attributes to be applied to incoming data from hosts to which this template is applied. The potential incoming security attributes include minimum label, maximum label, default label, and default clearance. 

Advanced Security Attributes 

Specifies security attributes to be applied to outgoing data to hosts to which this template is applied. The potential outgoing security attributes include DOI, IP label type, forced privileges, allowed privileges, RIPSO send class, RIPSO send PAF, RIPSO return PAF, and CIPSO domain.