Labeling Hosts and Networks
A Trusted Extensions system can contact other hosts only after the system
has defined the security attributes of those hosts. Because remote hosts can
have similar security attributes, Trusted Extensions provides security templates
to which you can add hosts.