Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Planning Your Trusted Network

For assistance in planning network hardware, see Planning for Network Deployment in Oracle Solaris 11.2 .

Trusted Extensions software recognizes four host types. Each host type has a default security template, as shown in Table 1–1.

Table 1-1  Default Host Templates in Trusted Extensions
Host Type
Template Name
Purpose
unlabeled
admin_low
Identifies untrusted hosts that can communicate with the global zone. Such hosts send packets that do not include labels. For more information, see unlabeled system.
cipso
cipso
Identifies hosts or networks that send CIPSO packets. CIPSO packets are labeled.
netif
netif
Identifies hosts that receive packets on a specific network interface from adaptive hosts.
adaptive
adapt
Identifies hosts or networks that are not labeled, but send unlabeled packets to a specific interface on a netif host.

If your network can be reached by other networks, you need to specify accessible domains and hosts. You also need to identify which Trusted Extensions hosts are going to serve as gateways. You need to identify the label accreditation range for these gateways, and the sensitivity label at which data from other hosts can be viewed.

The labeling of hosts, gateways, and networks is explained in Chapter 16, Managing Networks in Trusted Extensions. Assigning labels to remote systems is performed after initial setup.