For assistance in planning network hardware, see Planning for Network Deployment in Oracle Solaris 11.2 .
Trusted Extensions software recognizes four host types. Each host type has a default security template, as shown in Table 1–1.
|
If your network can be reached by other networks, you need to specify accessible domains and hosts. You also need to identify which Trusted Extensions hosts are going to serve as gateways. You need to identify the label accreditation range for these gateways, and the sensitivity label at which data from other hosts can be viewed.
The labeling of hosts, gateways, and networks is explained in Chapter 16, Managing Networks in Trusted Extensions. Assigning labels to remote systems is performed after initial setup.