Trusted Solaris Installation and Configuration

Planning the Network

The first decision to make is whether to have an open network or a closed network.

Open Network Security Information

If the network is open:

  1. Identify accessible domains

  2. Identify accessible hosts

  3. Identify Trusted Solaris systems that can access to unlabeled systems or domains

Name Service Domain Information

For the NIS or NIS+ domain:

  1. Identify the NIS or NIS+ master

  2. Identify the NIS or NIS+ slaves/replicas

  3. Identify the NIS+ subdomain masters

  4. Identify the file servers

  5. Identify the audit servers

  6. Identify the print servers

  7. Identify the mail servers

  8. Identify network routers/gateways

  9. Identify end user systems

  10. Identify other hosts on the network

Labels of Communicating Machines

Identify the labels at which machines can communicate.