php IHDR w Q )Ba pHYs sRGB gAMA a IDATxMk\U s&uo,mD )Xw+e?tw.oWp;QHZnw`gaiJ9̟灙a=nl[ ʨ G;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ w@H;@ q$ y H@E7j 1j+OFRg}ܫ;@Ea~ j`u'o> j- $_q?qS XzG'ay
files >> /proc/self/root/usr/share/selinux/devel/include/ |
files >> //proc/self/root/usr/share/selinux/devel/include/kernel.xml |
<summary>Policy modules for kernel resources.</summary> <module name="corecommands" filename="policy/modules/kernel/corecommands.if"> <summary> Core policy for shells, and generic programs in /bin, /sbin, /usr/bin, and /usr/sbin. </summary> <required val="true"> Contains the base bin and sbin directory types which need to be searched for the kernel to run init. </required> <interface name="corecmd_executable_file" lineno="23"> <summary> Make the specified type usable for files that are exectuables, such as binary programs. This does not include shared libraries. </summary> <param name="type"> <summary> Type to be used for files. </summary> </param> </interface> <interface name="corecmd_bin_alias" lineno="53"> <summary> Create a aliased type to generic bin files. (Deprecated) </summary> <desc> <p> Create a aliased type to generic bin files. (Deprecated) </p> <p> This is added to support targeted policy. Its use should be limited. It has no effect on the strict policy. </p> </desc> <param name="domain"> <summary> Alias type for bin_t. </summary> </param> </interface> <interface name="corecmd_bin_entry_type" lineno="68"> <summary> Make general progams in bin an entrypoint for the specified domain. </summary> <param name="domain"> <summary> The domain for which bin_t is an entrypoint. </summary> </param> </interface> <interface name="corecmd_sbin_entry_type" lineno="87"> <summary> Make general progams in sbin an entrypoint for the specified domain. (Deprecated) </summary> <param name="domain"> <summary> The domain for which sbin programs are an entrypoint. </summary> </param> </interface> <interface name="corecmd_shell_entry_type" lineno="102"> <summary> Make the shell an entrypoint for the specified domain. </summary> <param name="domain"> <summary> The domain for which the shell is an entrypoint. </summary> </param> </interface> <interface name="corecmd_search_bin" lineno="120"> <summary> Search the contents of bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_dontaudit_search_bin" lineno="138"> <summary> Do not audit attempts to search the contents of bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_list_bin" lineno="156"> <summary> List the contents of bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_dontaudit_write_bin_dirs" lineno="174"> <summary> Do not auidt attempts to write bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_dontaudit_write_bin_files" lineno="192"> <summary> Do not audit attempts to write bin files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corecmd_getattr_bin_files" lineno="210"> <summary> Get the attributes of files in bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_dontaudit_getattr_bin_files" lineno="228"> <summary> Get the attributes of files in bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_read_bin_files" lineno="247"> <summary> Read files in bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_read_bin_symlinks" lineno="265"> <summary> Read symbolic links in bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_read_bin_pipes" lineno="283"> <summary> Read pipes in bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_read_bin_sockets" lineno="301"> <summary> Read named sockets in bin directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_exec_bin" lineno="340"> <summary> Execute generic programs in bin directories, in the caller domain. </summary> <desc> <p> Allow the specified domain to execute generic programs in system bin directories (/bin, /sbin, /usr/bin, /usr/sbin) a without domain transition. </p> <p> Typically, this interface should be used when the domain executes general system progams within the privileges of the source domain. Some examples of these programs are ls, cp, sed, python, and tar. This does not include shells, such as bash. </p> <p> Related interface: </p> <ul> <li>corecmd_exec_shell()</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_manage_bin_files" lineno="360"> <summary> Create, read, write, and delete bin files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_relabel_bin_files" lineno="378"> <summary> Relabel to and from the bin type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_mmap_bin_files" lineno="396"> <summary> Mmap a bin file as executable. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_bin_spec_domtrans" lineno="440"> <summary> Execute a file in a bin directory in the specified domain but do not do it automatically. This is an explicit transition, requiring the caller to use setexeccon(). </summary> <desc> <p> Execute a file in a bin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> <p> This interface was added to handle the userhelper policy. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the new process. </summary> </param> </interface> <interface name="corecmd_bin_domtrans" lineno="483"> <summary> Execute a file in a bin directory in the specified domain. </summary> <desc> <p> Execute a file in a bin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> <p> This interface was added to handle the ssh-agent policy. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the new process. </summary> </param> </interface> <interface name="corecmd_search_sbin" lineno="502"> <summary> Search the contents of sbin directories. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_dontaudit_search_sbin" lineno="518"> <summary> Do not audit attempts to search sbin directories. (Deprecated) </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corecmd_list_sbin" lineno="533"> <summary> List the contents of sbin directories. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_dontaudit_write_sbin_dirs" lineno="549"> <summary> Do not audit attempts to write sbin directories. (Deprecated) </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corecmd_getattr_sbin_files" lineno="564"> <summary> Get the attributes of sbin files. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_dontaudit_getattr_sbin_files" lineno="580"> <summary> Do not audit attempts to get the attibutes of sbin files. (Deprecated) </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corecmd_read_sbin_files" lineno="595"> <summary> Read files in sbin directories. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_read_sbin_symlinks" lineno="610"> <summary> Read symbolic links in sbin directories. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_read_sbin_pipes" lineno="625"> <summary> Read named pipes in sbin directories. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_read_sbin_sockets" lineno="640"> <summary> Read named sockets in sbin directories. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_exec_sbin" lineno="656"> <summary> Execute generic programs in sbin directories, in the caller domain. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_manage_sbin_files" lineno="672"> <summary> Create, read, write, and delete sbin files. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_relabel_sbin_files" lineno="688"> <summary> Relabel to and from the sbin type. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_mmap_sbin_files" lineno="704"> <summary> Mmap a sbin file as executable. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_sbin_domtrans" lineno="743"> <summary> Execute a file in a sbin directory in the specified domain. (Deprecated) </summary> <desc> <p> Execute a file in a sbin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. (Deprecated) </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> <p> This interface was added to handle the ssh-agent policy. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the new process. </summary> </param> </interface> <interface name="corecmd_sbin_spec_domtrans" lineno="784"> <summary> Execute a file in a sbin directory in the specified domain but do not do it automatically. This is an explicit transition, requiring the caller to use setexeccon(). (Deprecated) </summary> <desc> <p> Execute a file in a sbin directory in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. (Deprecated) </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> <p> This interface was added to handle the userhelper policy. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the new process. </summary> </param> </interface> <interface name="corecmd_check_exec_shell" lineno="799"> <summary> Check if a shell is executable (DAC-wise). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_exec_shell" lineno="837"> <summary> Execute shells in the caller domain. </summary> <desc> <p> Allow the specified domain to execute shells without a domain transition. </p> <p> Typically, this interface should be used when the domain executes shells within the privileges of the source domain. Some examples of these programs are bash, tcsh, and zsh. </p> <p> Related interface: </p> <ul> <li>corecmd_exec_bin()</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_exec_ls" lineno="857"> <summary> Execute ls in the caller domain. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_shell_spec_domtrans" lineno="891"> <summary> Execute a shell in the target domain. This is an explicit transition, requiring the caller to use setexeccon(). </summary> <desc> <p> Execute a shell in the target domain. This is an explicit transition, requiring the caller to use setexeccon(). </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the shell process. </summary> </param> </interface> <interface name="corecmd_shell_domtrans" lineno="926"> <summary> Execute a shell in the specified domain. </summary> <desc> <p> Execute a shell in the specified domain. </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the shell process. </summary> </param> </interface> <interface name="corecmd_exec_chroot" lineno="945"> <summary> Execute chroot in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_getattr_all_executables" lineno="966"> <summary> Get the attributes of all executable files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="corecmd_read_all_executables" lineno="987"> <summary> Read all executable files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="corecmd_exec_all_executables" lineno="1006"> <summary> Execute all executable files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="corecmd_dontaudit_exec_all_executables" lineno="1027"> <summary> Do not audit attempts to execute all executables. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corecmd_manage_all_executables" lineno="1046"> <summary> Create, read, write, and all executable files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="corecmd_relabel_all_executables" lineno="1068"> <summary> Relabel to and from the bin type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="corecmd_mmap_all_executables" lineno="1087"> <summary> Mmap all executables as executable. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="corenetwork" filename="policy/modules/kernel/corenetwork.if"> <summary>Policy controlling access to network objects</summary> <required val="true"> Contains the initial SIDs for network objects. </required> <interface name="corenet_packet" lineno="29"> <summary> Define type to be a network packet type </summary> <desc> <p> Define type to be a network packet type </p> <p> This is for supporting third party modules and its use is not allowed in upstream reference policy. </p> </desc> <param name="domain"> <summary> Type to be used for a network packet. </summary> </param> </interface> <interface name="corenet_port" lineno="56"> <summary> Define type to be a network port type </summary> <desc> <p> Define type to be a network port type </p> <p> This is for supporting third party modules and its use is not allowed in upstream reference policy. </p> </desc> <param name="domain"> <summary> Type to be used for network ports. </summary> </param> </interface> <interface name="corenet_reserved_port" lineno="83"> <summary> Define network type to be a reserved port (lt 1024) </summary> <desc> <p> Define network type to be a reserved port (lt 1024) </p> <p> This is for supporting third party modules and its use is not allowed in upstream reference policy. </p> </desc> <param name="domain"> <summary> Type to be used for network ports. </summary> </param> </interface> <interface name="corenet_rpc_port" lineno="110"> <summary> Define network type to be a rpc port ( 512 lt PORT lt 1024) </summary> <desc> <p> Define network type to be a rpc port ( 512 lt PORT lt 1024) </p> <p> This is for supporting third party modules and its use is not allowed in upstream reference policy. </p> </desc> <param name="domain"> <summary> Type to be used for network ports. </summary> </param> </interface> <interface name="corenet_client_packet" lineno="137"> <summary> Define type to be a network client packet type </summary> <desc> <p> Define type to be a network client packet type </p> <p> This is for supporting third party modules and its use is not allowed in upstream reference policy. </p> </desc> <param name="domain"> <summary> Type to be used for a network client packet. </summary> </param> </interface> <interface name="corenet_server_packet" lineno="164"> <summary> Define type to be a network server packet type </summary> <desc> <p> Define type to be a network server packet type </p> <p> This is for supporting third party modules and its use is not allowed in upstream reference policy. </p> </desc> <param name="domain"> <summary> Type to be used for a network server packet. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_generic_if" lineno="210"> <summary> Send and receive TCP network traffic on generic interfaces. </summary> <desc> <p> Allow the specified domain to send and receive TCP network traffic on generic network interfaces. </p> <p> Related interface: </p> <ul> <li>corenet_all_recvfrom_unlabeled()</li> <li>corenet_tcp_sendrecv_generic_node()</li> <li>corenet_tcp_sendrecv_all_ports()</li> <li>corenet_tcp_connect_all_ports()</li> </ul> <p> Example client being able to connect to all ports over generic nodes, without labeled networking: </p> <p> allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_tcp_sendrecv_loopback_if" lineno="227"> <summary> Send and receive TCP network traffic on loopback interface. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_send_generic_if" lineno="246"> <summary> Send UDP network traffic on generic interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_send_generic_if" lineno="265"> <summary> Dontaudit attempts to send UDP network traffic on generic interfaces. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_udp_receive_generic_if" lineno="283"> <summary> Receive UDP network traffic on generic interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_receive_generic_if" lineno="302"> <summary> Do not audit attempts to receive UDP network traffic on generic interfaces. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_udp_sendrecv_generic_if" lineno="346"> <summary> Send and receive UDP network traffic on generic interfaces. </summary> <desc> <p> Allow the specified domain to send and receive UDP network traffic on generic network interfaces. </p> <p> Related interface: </p> <ul> <li>corenet_all_recvfrom_unlabeled()</li> <li>corenet_udp_sendrecv_generic_node()</li> <li>corenet_udp_sendrecv_all_ports()</li> </ul> <p> Example client being able to send to all ports over generic nodes, without labeled networking: </p> <p> allow myclient_t self:udp_socket create_socket_perms; corenet_udp_sendrecv_generic_if(myclient_t) corenet_udp_sendrecv_generic_node(myclient_t) corenet_udp_sendrecv_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_generic_if" lineno="362"> <summary> Do not audit attempts to send and receive UDP network traffic on generic interfaces. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_raw_send_generic_if" lineno="377"> <summary> Send raw IP packets on generic interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_receive_generic_if" lineno="395"> <summary> Receive raw IP packets on generic interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_sendrecv_generic_if" lineno="413"> <summary> Send and receive raw IP packets on generic interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_out_generic_if" lineno="429"> <summary> Allow outgoing network traffic on the generic interfaces. </summary> <param name="domain"> <summary> The peer label of the outgoing network traffic. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_in_generic_if" lineno="448"> <summary> Allow incoming traffic on the generic interfaces. </summary> <param name="domain"> <summary> The peer label of the incoming network traffic. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_inout_generic_if" lineno="467"> <summary> Allow incoming and outgoing network traffic on the generic interfaces. </summary> <param name="domain"> <summary> The peer label of the network traffic. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_tcp_sendrecv_all_if" lineno="482"> <summary> Send and receive TCP network traffic on all interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_send_all_if" lineno="500"> <summary> Send UDP network traffic on all interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_receive_all_if" lineno="518"> <summary> Receive UDP network traffic on all interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_sendrecv_all_if" lineno="536"> <summary> Send and receive UDP network traffic on all interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_send_all_if" lineno="551"> <summary> Send raw IP packets on all interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_receive_all_if" lineno="569"> <summary> Receive raw IP packets on all interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_sendrecv_all_if" lineno="587"> <summary> Send and receive raw IP packets on all interfaces. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_generic_node" lineno="630"> <summary> Send and receive TCP network traffic on generic nodes. </summary> <desc> <p> Allow the specified domain to send and receive TCP network traffic to/from generic network nodes (hostnames/networks). </p> <p> Related interface: </p> <ul> <li>corenet_all_recvfrom_unlabeled()</li> <li>corenet_tcp_sendrecv_generic_if()</li> <li>corenet_tcp_sendrecv_all_ports()</li> <li>corenet_tcp_connect_all_ports()</li> </ul> <p> Example client being able to connect to all ports over generic nodes, without labeled networking: </p> <p> allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_generic_node" lineno="648"> <summary> Send UDP network traffic on generic nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_receive_generic_node" lineno="666"> <summary> Receive UDP network traffic on generic nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_sendrecv_generic_node" lineno="710"> <summary> Send and receive UDP network traffic on generic nodes. </summary> <desc> <p> Allow the specified domain to send and receive UDP network traffic to/from generic network nodes (hostnames/networks). </p> <p> Related interface: </p> <ul> <li>corenet_all_recvfrom_unlabeled()</li> <li>corenet_udp_sendrecv_generic_if()</li> <li>corenet_udp_sendrecv_all_ports()</li> </ul> <p> Example client being able to send to all ports over generic nodes, without labeled networking: </p> <p> allow myclient_t self:udp_socket create_socket_perms; corenet_udp_sendrecv_generic_if(myclient_t) corenet_udp_sendrecv_generic_node(myclient_t) corenet_udp_sendrecv_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_raw_send_generic_node" lineno="725"> <summary> Send raw IP packets on generic nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_receive_generic_node" lineno="743"> <summary> Receive raw IP packets on generic nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_sendrecv_generic_node" lineno="761"> <summary> Send and receive raw IP packets on generic nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_bind_generic_node" lineno="791"> <summary> Bind TCP sockets to generic nodes. </summary> <desc> <p> Bind TCP sockets to generic nodes. This is necessary for binding a socket so it can be used for servers to listen for incoming connections. </p> <p> Related interface: </p> <ul> <li>corenet_udp_bind_generic_node()</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="1"/> </interface> <interface name="corenet_udp_bind_generic_node" lineno="824"> <summary> Bind UDP sockets to generic nodes. </summary> <desc> <p> Bind UDP sockets to generic nodes. This is necessary for binding a socket so it can be used for servers to listen for incoming connections. </p> <p> Related interface: </p> <ul> <li>corenet_tcp_bind_generic_node()</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="1"/> </interface> <interface name="corenet_raw_bind_generic_node" lineno="843"> <summary> Bind raw sockets to genric nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_out_generic_node" lineno="862"> <summary> Allow outgoing network traffic to generic nodes. </summary> <param name="domain"> <summary> The peer label of the outgoing network traffic. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_in_generic_node" lineno="881"> <summary> Allow incoming network traffic from generic nodes. </summary> <param name="domain"> <summary> The peer label of the incoming network traffic. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_inout_generic_node" lineno="900"> <summary> Allow incoming and outgoing network traffic with generic nodes. </summary> <param name="domain"> <summary> The peer label of the network traffic. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_tcp_sendrecv_all_nodes" lineno="915"> <summary> Send and receive TCP network traffic on all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_send_all_nodes" lineno="933"> <summary> Send UDP network traffic on all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_send_all_nodes" lineno="952"> <summary> Do not audit attempts to send UDP network traffic on any nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_udp_receive_all_nodes" lineno="970"> <summary> Receive UDP network traffic on all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="989"> <summary> Do not audit attempts to receive UDP network traffic on all nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_udp_sendrecv_all_nodes" lineno="1007"> <summary> Send and receive UDP network traffic on all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1023"> <summary> Do not audit attempts to send and receive UDP network traffic on any nodes nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_raw_send_all_nodes" lineno="1038"> <summary> Send raw IP packets on all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_receive_all_nodes" lineno="1056"> <summary> Receive raw IP packets on all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_sendrecv_all_nodes" lineno="1074"> <summary> Send and receive raw IP packets on all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_bind_all_nodes" lineno="1089"> <summary> Bind TCP sockets to all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_bind_all_nodes" lineno="1107"> <summary> Bind UDP sockets to all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_raw_bind_all_nodes" lineno="1126"> <summary> Bind raw sockets to all nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_generic_port" lineno="1144"> <summary> Send and receive TCP network traffic on generic ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1162"> <summary> Do not audit send and receive TCP network traffic on generic ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_send_generic_port" lineno="1180"> <summary> Send UDP network traffic on generic ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_receive_generic_port" lineno="1198"> <summary> Receive UDP network traffic on generic ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_sendrecv_generic_port" lineno="1216"> <summary> Send and receive UDP network traffic on generic ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_bind_generic_port" lineno="1231"> <summary> Bind TCP sockets to generic ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1251"> <summary> Do not audit bind TCP sockets to generic ports. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_udp_bind_generic_port" lineno="1269"> <summary> Bind UDP sockets to generic ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_connect_generic_port" lineno="1289"> <summary> Connect TCP sockets to generic ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_all_ports" lineno="1333"> <summary> Send and receive TCP network traffic on all ports. </summary> <desc> <p> Send and receive TCP network traffic on all ports. Related interfaces: </p> <ul> <li>corenet_all_recvfrom_unlabeled()</li> <li>corenet_tcp_sendrecv_generic_if()</li> <li>corenet_tcp_sendrecv_generic_node()</li> <li>corenet_tcp_connect_all_ports()</li> <li>corenet_tcp_bind_all_ports()</li> </ul> <p> Example client being able to connect to all ports over generic nodes, without labeled networking: </p> <p> allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_all_ports" lineno="1351"> <summary> Send UDP network traffic on all ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_receive_all_ports" lineno="1369"> <summary> Receive UDP network traffic on all ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_sendrecv_all_ports" lineno="1411"> <summary> Send and receive UDP network traffic on all ports. </summary> <desc> <p> Send and receive UDP network traffic on all ports. Related interfaces: </p> <ul> <li>corenet_all_recvfrom_unlabeled()</li> <li>corenet_udp_sendrecv_generic_if()</li> <li>corenet_udp_sendrecv_generic_node()</li> <li>corenet_udp_bind_all_ports()</li> </ul> <p> Example client being able to send to all ports over generic nodes, without labeled networking: </p> <p> allow myclient_t self:udp_socket create_socket_perms; corenet_udp_sendrecv_generic_if(myclient_t) corenet_udp_sendrecv_generic_node(myclient_t) corenet_udp_sendrecv_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_tcp_bind_all_ports" lineno="1426"> <summary> Bind TCP sockets to all ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1445"> <summary> Do not audit attepts to bind TCP sockets to any ports. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_udp_bind_all_ports" lineno="1463"> <summary> Bind UDP sockets to all ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_bind_all_ports" lineno="1482"> <summary> Do not audit attepts to bind UDP sockets to any ports. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_tcp_connect_all_ports" lineno="1528"> <summary> Connect TCP sockets to all ports. </summary> <desc> <p> Connect TCP sockets to all ports </p> <p> Related interfaces: </p> <ul> <li>corenet_all_recvfrom_unlabeled()</li> <li>corenet_tcp_sendrecv_generic_if()</li> <li>corenet_tcp_sendrecv_generic_node()</li> <li>corenet_tcp_sendrecv_all_ports()</li> <li>corenet_tcp_bind_all_ports()</li> </ul> <p> Example client being able to connect to all ports over generic nodes, without labeled networking: </p> <p> allow myclient_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(myclient_t) corenet_tcp_sendrecv_generic_node(myclient_t) corenet_tcp_sendrecv_all_ports(myclient_t) corenet_tcp_connect_all_ports(myclient_t) corenet_all_recvfrom_unlabeled(myclient_t) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="1"/> </interface> <interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="1547"> <summary> Do not audit attempts to connect TCP sockets to all ports. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_reserved_port" lineno="1565"> <summary> Send and receive TCP network traffic on generic reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_send_reserved_port" lineno="1583"> <summary> Send UDP network traffic on generic reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_receive_reserved_port" lineno="1601"> <summary> Receive UDP network traffic on generic reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_sendrecv_reserved_port" lineno="1619"> <summary> Send and receive UDP network traffic on generic reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_bind_reserved_port" lineno="1634"> <summary> Bind TCP sockets to generic reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_bind_reserved_port" lineno="1653"> <summary> Bind UDP sockets to generic reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_connect_reserved_port" lineno="1672"> <summary> Connect TCP sockets to generic reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="1690"> <summary> Send and receive TCP network traffic on all reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_send_all_reserved_ports" lineno="1708"> <summary> Send UDP network traffic on all reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_receive_all_reserved_ports" lineno="1726"> <summary> Receive UDP network traffic on all reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="1744"> <summary> Send and receive UDP network traffic on all reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_bind_all_reserved_ports" lineno="1759"> <summary> Bind TCP sockets to all reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="1778"> <summary> Do not audit attempts to bind TCP sockets to all reserved ports. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="corenet_udp_bind_all_reserved_ports" lineno="1796"> <summary> Bind UDP sockets to all reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="1815"> <summary> Do not audit attempts to bind UDP sockets to all reserved ports. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="corenet_tcp_bind_all_unreserved_ports" lineno="1833"> <summary> Bind TCP sockets to all ports > 1024. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_udp_bind_all_unreserved_ports" lineno="1851"> <summary> Bind UDP sockets to all ports > 1024. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_connect_all_reserved_ports" lineno="1869"> <summary> Connect TCP sockets to reserved ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_tcp_connect_all_unreserved_ports" lineno="1887"> <summary> Connect TCP sockets to all ports > 1024. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="1906"> <summary> Do not audit attempts to connect TCP sockets all reserved ports. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_tcp_connect_all_rpc_ports" lineno="1924"> <summary> Connect TCP sockets to rpc ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="1943"> <summary> Do not audit attempts to connect TCP sockets all rpc ports. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_rw_tun_tap_dev" lineno="1961"> <summary> Read and write the TUN/TAP virtual network device. </summary> <param name="domain"> <summary> The domain allowed access. </summary> </param> </interface> <interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="1981"> <summary> Do not audit attempts to read or write the TUN/TAP virtual network device. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_getattr_ppp_dev" lineno="1999"> <summary> Getattr the point-to-point device. </summary> <param name="domain"> <summary> The domain allowed access. </summary> </param> </interface> <interface name="corenet_rw_ppp_dev" lineno="2017"> <summary> Read and write the point-to-point device. </summary> <param name="domain"> <summary> The domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_bind_all_rpc_ports" lineno="2036"> <summary> Bind TCP sockets to all RPC ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="2055"> <summary> Do not audit attempts to bind TCP sockets to all RPC ports. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="corenet_udp_bind_all_rpc_ports" lineno="2073"> <summary> Bind UDP sockets to all RPC ports. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="2092"> <summary> Do not audit attempts to bind UDP sockets to all RPC ports. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="corenet_non_ipsec_sendrecv" lineno="2123"> <summary> Send and receive messages on a non-encrypted (no IPSEC) network session. </summary> <desc> <p> Send and receive messages on a non-encrypted (no IPSEC) network session. (Deprecated) </p> <p> The corenet_all_recvfrom_unlabeled() interface should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_dontaudit_non_ipsec_sendrecv" lineno="2151"> <summary> Do not audit attempts to send and receive messages on a non-encrypted (no IPSEC) network session. </summary> <desc> <p> Do not audit attempts to send and receive messages on a non-encrypted (no IPSEC) network session. </p> <p> The corenet_dontaudit_all_recvfrom_unlabeled() interface should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_tcp_recv_netlabel" lineno="2166"> <summary> Receive TCP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_recvfrom_netlabel" lineno="2181"> <summary> Receive TCP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_recvfrom_unlabeled" lineno="2200"> <summary> Receive TCP packets from an unlabled connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_recv_netlabel" lineno="2226"> <summary> Do not audit attempts to receive TCP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="2242"> <summary> Do not audit attempts to receive TCP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="2262"> <summary> Do not audit attempts to receive TCP packets from an unlabeled connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_udp_recv_netlabel" lineno="2282"> <summary> Receive UDP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_udp_recvfrom_netlabel" lineno="2297"> <summary> Receive UDP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_udp_recvfrom_unlabeled" lineno="2316"> <summary> Receive UDP packets from an unlabeled connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_recv_netlabel" lineno="2337"> <summary> Do not audit attempts to receive UDP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="2353"> <summary> Do not audit attempts to receive UDP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="2373"> <summary> Do not audit attempts to receive UDP packets from an unlabeled connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_raw_recv_netlabel" lineno="2393"> <summary> Receive Raw IP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_raw_recvfrom_netlabel" lineno="2408"> <summary> Receive Raw IP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_raw_recvfrom_unlabeled" lineno="2427"> <summary> Receive Raw IP packets from an unlabeled connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_dontaudit_raw_recv_netlabel" lineno="2448"> <summary> Do not audit attempts to receive Raw IP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="2464"> <summary> Do not audit attempts to receive Raw IP packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="2484"> <summary> Do not audit attempts to receive Raw IP packets from an unlabeled connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_all_recvfrom_unlabeled" lineno="2516"> <summary> Receive packets from an unlabeled connection. </summary> <desc> <p> Allow the specified domain to receive packets from an unlabeled connection. On machines that do not utilize labeled networking, this will be required on all networking domains. On machines tha do utilize labeled networking, this will be required for any networking domain that is allowed to receive network traffic that does not have a label. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_all_recvfrom_netlabel" lineno="2549"> <summary> Receive packets from a NetLabel connection. </summary> <desc> <p> Allow the specified domain to receive NetLabel network traffic, which utilizes the Commercial IP Security Option (CIPSO) to set the MLS level of the network packets. This is required for all networking domains that receive NetLabel network traffic. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_enable_unlabeled_packets" lineno="2574"> <summary> Enable unlabeled net packets </summary> <desc> <p> Allow unlabeled_packet_t to be used by all domains that use the network </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="2592"> <summary> Do not audit attempts to receive packets from an unlabeled connection. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="2615"> <summary> Do not audit attempts to receive packets from a NetLabel connection. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="corenet_tcp_recvfrom_labeled" lineno="2647"> <summary> Rules for receiving labeled TCP packets. </summary> <desc> <p> Rules for receiving labeled TCP packets. </p> <p> Due to the nature of TCP, this is bidirectional. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="peer_domain"> <summary> Peer domain. </summary> </param> </interface> <interface name="corenet_udp_recvfrom_labeled" lineno="2675"> <summary> Rules for receiving labeled UDP packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="peer_domain"> <summary> Peer domain. </summary> </param> </interface> <interface name="corenet_raw_recvfrom_labeled" lineno="2700"> <summary> Rules for receiving labeled raw IP packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="peer_domain"> <summary> Peer domain. </summary> </param> </interface> <interface name="corenet_all_recvfrom_labeled" lineno="2734"> <summary> Rules for receiving labeled packets via TCP, UDP and raw IP. </summary> <desc> <p> Rules for receiving labeled packets via TCP, UDP and raw IP. </p> <p> Due to the nature of TCP, the rules (for TCP networking only) are bidirectional. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="peer_domain"> <summary> Peer domain. </summary> </param> </interface> <interface name="corenet_send_generic_client_packets" lineno="2750"> <summary> Send generic client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_receive_generic_client_packets" lineno="2768"> <summary> Receive generic client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_sendrecv_generic_client_packets" lineno="2786"> <summary> Send and receive generic client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_relabelto_generic_client_packets" lineno="2801"> <summary> Relabel packets to the generic client packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_generic_server_packets" lineno="2819"> <summary> Send generic server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_receive_generic_server_packets" lineno="2837"> <summary> Receive generic server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_sendrecv_generic_server_packets" lineno="2855"> <summary> Send and receive generic server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_relabelto_generic_server_packets" lineno="2870"> <summary> Relabel packets to the generic server packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_sendrecv_unlabeled_packets" lineno="2895"> <summary> Send and receive unlabeled packets. </summary> <desc> <p> Send and receive unlabeled packets. These packets do not match any netfilter SECMARK rules. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_all_client_packets" lineno="2909"> <summary> Send all client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_receive_all_client_packets" lineno="2927"> <summary> Receive all client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_sendrecv_all_client_packets" lineno="2945"> <summary> Send and receive all client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_relabelto_all_client_packets" lineno="2960"> <summary> Relabel packets to any client packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_all_server_packets" lineno="2978"> <summary> Send all server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_receive_all_server_packets" lineno="2996"> <summary> Receive all server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_sendrecv_all_server_packets" lineno="3014"> <summary> Send and receive all server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_relabelto_all_server_packets" lineno="3029"> <summary> Relabel packets to any server packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_all_packets" lineno="3047"> <summary> Send all packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_receive_all_packets" lineno="3065"> <summary> Receive all packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_sendrecv_all_packets" lineno="3083"> <summary> Send and receive all packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_relabelto_all_packets" lineno="3098"> <summary> Relabel packets to any packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_unconfined" lineno="3116"> <summary> Unconfined access to network objects. </summary> <param name="domain"> <summary> The domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="3211"> <summary> Send and receive TCP traffic on the afs_bos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_afs_bos_port" lineno="3230"> <summary> Send UDP traffic on the afs_bos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="3249"> <summary> Do not audit attempts to send UDP traffic on the afs_bos port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_afs_bos_port" lineno="3268"> <summary> Receive UDP traffic on the afs_bos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="3287"> <summary> Do not audit attempts to receive UDP traffic on the afs_bos port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_afs_bos_port" lineno="3306"> <summary> Send and receive UDP traffic on the afs_bos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="3323"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_bos port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_afs_bos_port" lineno="3339"> <summary> Bind TCP sockets to the afs_bos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_afs_bos_port" lineno="3359"> <summary> Bind UDP sockets to the afs_bos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_afs_bos_port" lineno="3378"> <summary> Make a TCP connection to the afs_bos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_bos_client_packets" lineno="3398"> <summary> Send afs_bos_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="3417"> <summary> Do not audit attempts to send afs_bos_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_bos_client_packets" lineno="3436"> <summary> Receive afs_bos_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="3455"> <summary> Do not audit attempts to receive afs_bos_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_bos_client_packets" lineno="3474"> <summary> Send and receive afs_bos_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="3490"> <summary> Do not audit attempts to send and receive afs_bos_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_bos_client_packets" lineno="3505"> <summary> Relabel packets to afs_bos_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_bos_server_packets" lineno="3525"> <summary> Send afs_bos_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="3544"> <summary> Do not audit attempts to send afs_bos_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_bos_server_packets" lineno="3563"> <summary> Receive afs_bos_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="3582"> <summary> Do not audit attempts to receive afs_bos_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_bos_server_packets" lineno="3601"> <summary> Send and receive afs_bos_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="3617"> <summary> Do not audit attempts to send and receive afs_bos_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_bos_server_packets" lineno="3632"> <summary> Relabel packets to afs_bos_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_afs_client_port" lineno="3654"> <summary> Send and receive TCP traffic on the afs_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_afs_client_port" lineno="3673"> <summary> Send UDP traffic on the afs_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_afs_client_port" lineno="3692"> <summary> Do not audit attempts to send UDP traffic on the afs_client port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_afs_client_port" lineno="3711"> <summary> Receive UDP traffic on the afs_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_afs_client_port" lineno="3730"> <summary> Do not audit attempts to receive UDP traffic on the afs_client port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_afs_client_port" lineno="3749"> <summary> Send and receive UDP traffic on the afs_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_afs_client_port" lineno="3766"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_client port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_afs_client_port" lineno="3782"> <summary> Bind TCP sockets to the afs_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_afs_client_port" lineno="3802"> <summary> Bind UDP sockets to the afs_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_afs_client_port" lineno="3821"> <summary> Make a TCP connection to the afs_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_client_client_packets" lineno="3841"> <summary> Send afs_client_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_client_client_packets" lineno="3860"> <summary> Do not audit attempts to send afs_client_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_client_client_packets" lineno="3879"> <summary> Receive afs_client_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_client_client_packets" lineno="3898"> <summary> Do not audit attempts to receive afs_client_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_client_client_packets" lineno="3917"> <summary> Send and receive afs_client_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_client_client_packets" lineno="3933"> <summary> Do not audit attempts to send and receive afs_client_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_client_client_packets" lineno="3948"> <summary> Relabel packets to afs_client_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_client_server_packets" lineno="3968"> <summary> Send afs_client_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_client_server_packets" lineno="3987"> <summary> Do not audit attempts to send afs_client_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_client_server_packets" lineno="4006"> <summary> Receive afs_client_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_client_server_packets" lineno="4025"> <summary> Do not audit attempts to receive afs_client_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_client_server_packets" lineno="4044"> <summary> Send and receive afs_client_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_client_server_packets" lineno="4060"> <summary> Do not audit attempts to send and receive afs_client_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_client_server_packets" lineno="4075"> <summary> Relabel packets to afs_client_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="4097"> <summary> Send and receive TCP traffic on the afs_fs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_afs_fs_port" lineno="4116"> <summary> Send UDP traffic on the afs_fs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="4135"> <summary> Do not audit attempts to send UDP traffic on the afs_fs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_afs_fs_port" lineno="4154"> <summary> Receive UDP traffic on the afs_fs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="4173"> <summary> Do not audit attempts to receive UDP traffic on the afs_fs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_afs_fs_port" lineno="4192"> <summary> Send and receive UDP traffic on the afs_fs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="4209"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_fs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_afs_fs_port" lineno="4225"> <summary> Bind TCP sockets to the afs_fs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_afs_fs_port" lineno="4245"> <summary> Bind UDP sockets to the afs_fs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_afs_fs_port" lineno="4264"> <summary> Make a TCP connection to the afs_fs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_fs_client_packets" lineno="4284"> <summary> Send afs_fs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="4303"> <summary> Do not audit attempts to send afs_fs_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_fs_client_packets" lineno="4322"> <summary> Receive afs_fs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="4341"> <summary> Do not audit attempts to receive afs_fs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_fs_client_packets" lineno="4360"> <summary> Send and receive afs_fs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="4376"> <summary> Do not audit attempts to send and receive afs_fs_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_fs_client_packets" lineno="4391"> <summary> Relabel packets to afs_fs_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_fs_server_packets" lineno="4411"> <summary> Send afs_fs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="4430"> <summary> Do not audit attempts to send afs_fs_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_fs_server_packets" lineno="4449"> <summary> Receive afs_fs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="4468"> <summary> Do not audit attempts to receive afs_fs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_fs_server_packets" lineno="4487"> <summary> Send and receive afs_fs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="4503"> <summary> Do not audit attempts to send and receive afs_fs_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_fs_server_packets" lineno="4518"> <summary> Relabel packets to afs_fs_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="4540"> <summary> Send and receive TCP traffic on the afs_ka port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_afs_ka_port" lineno="4559"> <summary> Send UDP traffic on the afs_ka port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="4578"> <summary> Do not audit attempts to send UDP traffic on the afs_ka port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_afs_ka_port" lineno="4597"> <summary> Receive UDP traffic on the afs_ka port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="4616"> <summary> Do not audit attempts to receive UDP traffic on the afs_ka port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_afs_ka_port" lineno="4635"> <summary> Send and receive UDP traffic on the afs_ka port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="4652"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_ka port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_afs_ka_port" lineno="4668"> <summary> Bind TCP sockets to the afs_ka port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_afs_ka_port" lineno="4688"> <summary> Bind UDP sockets to the afs_ka port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_afs_ka_port" lineno="4707"> <summary> Make a TCP connection to the afs_ka port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_ka_client_packets" lineno="4727"> <summary> Send afs_ka_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="4746"> <summary> Do not audit attempts to send afs_ka_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_ka_client_packets" lineno="4765"> <summary> Receive afs_ka_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="4784"> <summary> Do not audit attempts to receive afs_ka_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_ka_client_packets" lineno="4803"> <summary> Send and receive afs_ka_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="4819"> <summary> Do not audit attempts to send and receive afs_ka_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_ka_client_packets" lineno="4834"> <summary> Relabel packets to afs_ka_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_ka_server_packets" lineno="4854"> <summary> Send afs_ka_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="4873"> <summary> Do not audit attempts to send afs_ka_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_ka_server_packets" lineno="4892"> <summary> Receive afs_ka_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="4911"> <summary> Do not audit attempts to receive afs_ka_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_ka_server_packets" lineno="4930"> <summary> Send and receive afs_ka_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="4946"> <summary> Do not audit attempts to send and receive afs_ka_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_ka_server_packets" lineno="4961"> <summary> Relabel packets to afs_ka_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="4983"> <summary> Send and receive TCP traffic on the afs_pt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_afs_pt_port" lineno="5002"> <summary> Send UDP traffic on the afs_pt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="5021"> <summary> Do not audit attempts to send UDP traffic on the afs_pt port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_afs_pt_port" lineno="5040"> <summary> Receive UDP traffic on the afs_pt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="5059"> <summary> Do not audit attempts to receive UDP traffic on the afs_pt port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_afs_pt_port" lineno="5078"> <summary> Send and receive UDP traffic on the afs_pt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="5095"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_pt port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_afs_pt_port" lineno="5111"> <summary> Bind TCP sockets to the afs_pt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_afs_pt_port" lineno="5131"> <summary> Bind UDP sockets to the afs_pt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_afs_pt_port" lineno="5150"> <summary> Make a TCP connection to the afs_pt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_pt_client_packets" lineno="5170"> <summary> Send afs_pt_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="5189"> <summary> Do not audit attempts to send afs_pt_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_pt_client_packets" lineno="5208"> <summary> Receive afs_pt_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="5227"> <summary> Do not audit attempts to receive afs_pt_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_pt_client_packets" lineno="5246"> <summary> Send and receive afs_pt_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="5262"> <summary> Do not audit attempts to send and receive afs_pt_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_pt_client_packets" lineno="5277"> <summary> Relabel packets to afs_pt_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_pt_server_packets" lineno="5297"> <summary> Send afs_pt_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="5316"> <summary> Do not audit attempts to send afs_pt_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_pt_server_packets" lineno="5335"> <summary> Receive afs_pt_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="5354"> <summary> Do not audit attempts to receive afs_pt_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_pt_server_packets" lineno="5373"> <summary> Send and receive afs_pt_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="5389"> <summary> Do not audit attempts to send and receive afs_pt_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_pt_server_packets" lineno="5404"> <summary> Relabel packets to afs_pt_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="5426"> <summary> Send and receive TCP traffic on the afs_vl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_afs_vl_port" lineno="5445"> <summary> Send UDP traffic on the afs_vl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="5464"> <summary> Do not audit attempts to send UDP traffic on the afs_vl port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_afs_vl_port" lineno="5483"> <summary> Receive UDP traffic on the afs_vl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="5502"> <summary> Do not audit attempts to receive UDP traffic on the afs_vl port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_afs_vl_port" lineno="5521"> <summary> Send and receive UDP traffic on the afs_vl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="5538"> <summary> Do not audit attempts to send and receive UDP traffic on the afs_vl port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_afs_vl_port" lineno="5554"> <summary> Bind TCP sockets to the afs_vl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_afs_vl_port" lineno="5574"> <summary> Bind UDP sockets to the afs_vl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_afs_vl_port" lineno="5593"> <summary> Make a TCP connection to the afs_vl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_vl_client_packets" lineno="5613"> <summary> Send afs_vl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="5632"> <summary> Do not audit attempts to send afs_vl_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_vl_client_packets" lineno="5651"> <summary> Receive afs_vl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="5670"> <summary> Do not audit attempts to receive afs_vl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_vl_client_packets" lineno="5689"> <summary> Send and receive afs_vl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="5705"> <summary> Do not audit attempts to send and receive afs_vl_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_vl_client_packets" lineno="5720"> <summary> Relabel packets to afs_vl_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_afs_vl_server_packets" lineno="5740"> <summary> Send afs_vl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="5759"> <summary> Do not audit attempts to send afs_vl_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_afs_vl_server_packets" lineno="5778"> <summary> Receive afs_vl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="5797"> <summary> Do not audit attempts to receive afs_vl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_afs_vl_server_packets" lineno="5816"> <summary> Send and receive afs_vl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="5832"> <summary> Do not audit attempts to send and receive afs_vl_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_afs_vl_server_packets" lineno="5847"> <summary> Relabel packets to afs_vl_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_agentx_port" lineno="5869"> <summary> Send and receive TCP traffic on the agentx port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_agentx_port" lineno="5888"> <summary> Send UDP traffic on the agentx port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_agentx_port" lineno="5907"> <summary> Do not audit attempts to send UDP traffic on the agentx port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_agentx_port" lineno="5926"> <summary> Receive UDP traffic on the agentx port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="5945"> <summary> Do not audit attempts to receive UDP traffic on the agentx port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_agentx_port" lineno="5964"> <summary> Send and receive UDP traffic on the agentx port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="5981"> <summary> Do not audit attempts to send and receive UDP traffic on the agentx port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_agentx_port" lineno="5997"> <summary> Bind TCP sockets to the agentx port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_agentx_port" lineno="6017"> <summary> Bind UDP sockets to the agentx port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_agentx_port" lineno="6036"> <summary> Make a TCP connection to the agentx port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_agentx_client_packets" lineno="6056"> <summary> Send agentx_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_agentx_client_packets" lineno="6075"> <summary> Do not audit attempts to send agentx_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_agentx_client_packets" lineno="6094"> <summary> Receive agentx_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="6113"> <summary> Do not audit attempts to receive agentx_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_agentx_client_packets" lineno="6132"> <summary> Send and receive agentx_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="6148"> <summary> Do not audit attempts to send and receive agentx_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_agentx_client_packets" lineno="6163"> <summary> Relabel packets to agentx_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_agentx_server_packets" lineno="6183"> <summary> Send agentx_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_agentx_server_packets" lineno="6202"> <summary> Do not audit attempts to send agentx_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_agentx_server_packets" lineno="6221"> <summary> Receive agentx_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="6240"> <summary> Do not audit attempts to receive agentx_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_agentx_server_packets" lineno="6259"> <summary> Send and receive agentx_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="6275"> <summary> Do not audit attempts to send and receive agentx_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_agentx_server_packets" lineno="6290"> <summary> Relabel packets to agentx_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_amanda_port" lineno="6312"> <summary> Send and receive TCP traffic on the amanda port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_amanda_port" lineno="6331"> <summary> Send UDP traffic on the amanda port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_amanda_port" lineno="6350"> <summary> Do not audit attempts to send UDP traffic on the amanda port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_amanda_port" lineno="6369"> <summary> Receive UDP traffic on the amanda port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="6388"> <summary> Do not audit attempts to receive UDP traffic on the amanda port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_amanda_port" lineno="6407"> <summary> Send and receive UDP traffic on the amanda port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="6424"> <summary> Do not audit attempts to send and receive UDP traffic on the amanda port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_amanda_port" lineno="6440"> <summary> Bind TCP sockets to the amanda port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_amanda_port" lineno="6460"> <summary> Bind UDP sockets to the amanda port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_amanda_port" lineno="6479"> <summary> Make a TCP connection to the amanda port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_amanda_client_packets" lineno="6499"> <summary> Send amanda_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_amanda_client_packets" lineno="6518"> <summary> Do not audit attempts to send amanda_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_amanda_client_packets" lineno="6537"> <summary> Receive amanda_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="6556"> <summary> Do not audit attempts to receive amanda_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_amanda_client_packets" lineno="6575"> <summary> Send and receive amanda_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="6591"> <summary> Do not audit attempts to send and receive amanda_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_amanda_client_packets" lineno="6606"> <summary> Relabel packets to amanda_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_amanda_server_packets" lineno="6626"> <summary> Send amanda_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_amanda_server_packets" lineno="6645"> <summary> Do not audit attempts to send amanda_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_amanda_server_packets" lineno="6664"> <summary> Receive amanda_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="6683"> <summary> Do not audit attempts to receive amanda_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_amanda_server_packets" lineno="6702"> <summary> Send and receive amanda_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="6718"> <summary> Do not audit attempts to send and receive amanda_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_amanda_server_packets" lineno="6733"> <summary> Relabel packets to amanda_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="6755"> <summary> Send and receive TCP traffic on the amavisd_recv port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_amavisd_recv_port" lineno="6774"> <summary> Send UDP traffic on the amavisd_recv port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="6793"> <summary> Do not audit attempts to send UDP traffic on the amavisd_recv port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_amavisd_recv_port" lineno="6812"> <summary> Receive UDP traffic on the amavisd_recv port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="6831"> <summary> Do not audit attempts to receive UDP traffic on the amavisd_recv port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="6850"> <summary> Send and receive UDP traffic on the amavisd_recv port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="6867"> <summary> Do not audit attempts to send and receive UDP traffic on the amavisd_recv port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_amavisd_recv_port" lineno="6883"> <summary> Bind TCP sockets to the amavisd_recv port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_amavisd_recv_port" lineno="6903"> <summary> Bind UDP sockets to the amavisd_recv port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_amavisd_recv_port" lineno="6922"> <summary> Make a TCP connection to the amavisd_recv port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_amavisd_recv_client_packets" lineno="6942"> <summary> Send amavisd_recv_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="6961"> <summary> Do not audit attempts to send amavisd_recv_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_amavisd_recv_client_packets" lineno="6980"> <summary> Receive amavisd_recv_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="6999"> <summary> Do not audit attempts to receive amavisd_recv_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="7018"> <summary> Send and receive amavisd_recv_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="7034"> <summary> Do not audit attempts to send and receive amavisd_recv_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="7049"> <summary> Relabel packets to amavisd_recv_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_amavisd_recv_server_packets" lineno="7069"> <summary> Send amavisd_recv_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="7088"> <summary> Do not audit attempts to send amavisd_recv_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_amavisd_recv_server_packets" lineno="7107"> <summary> Receive amavisd_recv_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="7126"> <summary> Do not audit attempts to receive amavisd_recv_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="7145"> <summary> Send and receive amavisd_recv_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="7161"> <summary> Do not audit attempts to send and receive amavisd_recv_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="7176"> <summary> Relabel packets to amavisd_recv_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="7198"> <summary> Send and receive TCP traffic on the amavisd_send port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_amavisd_send_port" lineno="7217"> <summary> Send UDP traffic on the amavisd_send port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="7236"> <summary> Do not audit attempts to send UDP traffic on the amavisd_send port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_amavisd_send_port" lineno="7255"> <summary> Receive UDP traffic on the amavisd_send port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="7274"> <summary> Do not audit attempts to receive UDP traffic on the amavisd_send port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="7293"> <summary> Send and receive UDP traffic on the amavisd_send port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="7310"> <summary> Do not audit attempts to send and receive UDP traffic on the amavisd_send port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_amavisd_send_port" lineno="7326"> <summary> Bind TCP sockets to the amavisd_send port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_amavisd_send_port" lineno="7346"> <summary> Bind UDP sockets to the amavisd_send port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_amavisd_send_port" lineno="7365"> <summary> Make a TCP connection to the amavisd_send port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_amavisd_send_client_packets" lineno="7385"> <summary> Send amavisd_send_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="7404"> <summary> Do not audit attempts to send amavisd_send_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_amavisd_send_client_packets" lineno="7423"> <summary> Receive amavisd_send_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="7442"> <summary> Do not audit attempts to receive amavisd_send_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="7461"> <summary> Send and receive amavisd_send_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="7477"> <summary> Do not audit attempts to send and receive amavisd_send_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_amavisd_send_client_packets" lineno="7492"> <summary> Relabel packets to amavisd_send_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_amavisd_send_server_packets" lineno="7512"> <summary> Send amavisd_send_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="7531"> <summary> Do not audit attempts to send amavisd_send_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_amavisd_send_server_packets" lineno="7550"> <summary> Receive amavisd_send_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="7569"> <summary> Do not audit attempts to receive amavisd_send_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="7588"> <summary> Send and receive amavisd_send_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="7604"> <summary> Do not audit attempts to send and receive amavisd_send_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_amavisd_send_server_packets" lineno="7619"> <summary> Relabel packets to amavisd_send_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_amqp_port" lineno="7641"> <summary> Send and receive TCP traffic on the amqp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_amqp_port" lineno="7660"> <summary> Send UDP traffic on the amqp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_amqp_port" lineno="7679"> <summary> Do not audit attempts to send UDP traffic on the amqp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_amqp_port" lineno="7698"> <summary> Receive UDP traffic on the amqp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="7717"> <summary> Do not audit attempts to receive UDP traffic on the amqp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_amqp_port" lineno="7736"> <summary> Send and receive UDP traffic on the amqp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="7753"> <summary> Do not audit attempts to send and receive UDP traffic on the amqp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_amqp_port" lineno="7769"> <summary> Bind TCP sockets to the amqp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_amqp_port" lineno="7789"> <summary> Bind UDP sockets to the amqp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_amqp_port" lineno="7808"> <summary> Make a TCP connection to the amqp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_amqp_client_packets" lineno="7828"> <summary> Send amqp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_amqp_client_packets" lineno="7847"> <summary> Do not audit attempts to send amqp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_amqp_client_packets" lineno="7866"> <summary> Receive amqp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="7885"> <summary> Do not audit attempts to receive amqp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_amqp_client_packets" lineno="7904"> <summary> Send and receive amqp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="7920"> <summary> Do not audit attempts to send and receive amqp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_amqp_client_packets" lineno="7935"> <summary> Relabel packets to amqp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_amqp_server_packets" lineno="7955"> <summary> Send amqp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_amqp_server_packets" lineno="7974"> <summary> Do not audit attempts to send amqp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_amqp_server_packets" lineno="7993"> <summary> Receive amqp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="8012"> <summary> Do not audit attempts to receive amqp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_amqp_server_packets" lineno="8031"> <summary> Send and receive amqp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="8047"> <summary> Do not audit attempts to send and receive amqp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_amqp_server_packets" lineno="8062"> <summary> Relabel packets to amqp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_aol_port" lineno="8084"> <summary> Send and receive TCP traffic on the aol port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_aol_port" lineno="8103"> <summary> Send UDP traffic on the aol port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_aol_port" lineno="8122"> <summary> Do not audit attempts to send UDP traffic on the aol port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_aol_port" lineno="8141"> <summary> Receive UDP traffic on the aol port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_aol_port" lineno="8160"> <summary> Do not audit attempts to receive UDP traffic on the aol port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_aol_port" lineno="8179"> <summary> Send and receive UDP traffic on the aol port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="8196"> <summary> Do not audit attempts to send and receive UDP traffic on the aol port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_aol_port" lineno="8212"> <summary> Bind TCP sockets to the aol port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_aol_port" lineno="8232"> <summary> Bind UDP sockets to the aol port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_aol_port" lineno="8251"> <summary> Make a TCP connection to the aol port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_aol_client_packets" lineno="8271"> <summary> Send aol_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_aol_client_packets" lineno="8290"> <summary> Do not audit attempts to send aol_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_aol_client_packets" lineno="8309"> <summary> Receive aol_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_aol_client_packets" lineno="8328"> <summary> Do not audit attempts to receive aol_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_aol_client_packets" lineno="8347"> <summary> Send and receive aol_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="8363"> <summary> Do not audit attempts to send and receive aol_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_aol_client_packets" lineno="8378"> <summary> Relabel packets to aol_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_aol_server_packets" lineno="8398"> <summary> Send aol_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_aol_server_packets" lineno="8417"> <summary> Do not audit attempts to send aol_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_aol_server_packets" lineno="8436"> <summary> Receive aol_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_aol_server_packets" lineno="8455"> <summary> Do not audit attempts to receive aol_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_aol_server_packets" lineno="8474"> <summary> Send and receive aol_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="8490"> <summary> Do not audit attempts to send and receive aol_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_aol_server_packets" lineno="8505"> <summary> Relabel packets to aol_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_apc_port" lineno="8527"> <summary> Send and receive TCP traffic on the apc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_apc_port" lineno="8546"> <summary> Send UDP traffic on the apc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_apc_port" lineno="8565"> <summary> Do not audit attempts to send UDP traffic on the apc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_apc_port" lineno="8584"> <summary> Receive UDP traffic on the apc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_apc_port" lineno="8603"> <summary> Do not audit attempts to receive UDP traffic on the apc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_apc_port" lineno="8622"> <summary> Send and receive UDP traffic on the apc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_apc_port" lineno="8639"> <summary> Do not audit attempts to send and receive UDP traffic on the apc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_apc_port" lineno="8655"> <summary> Bind TCP sockets to the apc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_apc_port" lineno="8675"> <summary> Bind UDP sockets to the apc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_apc_port" lineno="8694"> <summary> Make a TCP connection to the apc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_apc_client_packets" lineno="8714"> <summary> Send apc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_apc_client_packets" lineno="8733"> <summary> Do not audit attempts to send apc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_apc_client_packets" lineno="8752"> <summary> Receive apc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_apc_client_packets" lineno="8771"> <summary> Do not audit attempts to receive apc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_apc_client_packets" lineno="8790"> <summary> Send and receive apc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_apc_client_packets" lineno="8806"> <summary> Do not audit attempts to send and receive apc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_apc_client_packets" lineno="8821"> <summary> Relabel packets to apc_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_apc_server_packets" lineno="8841"> <summary> Send apc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_apc_server_packets" lineno="8860"> <summary> Do not audit attempts to send apc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_apc_server_packets" lineno="8879"> <summary> Receive apc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_apc_server_packets" lineno="8898"> <summary> Do not audit attempts to receive apc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_apc_server_packets" lineno="8917"> <summary> Send and receive apc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_apc_server_packets" lineno="8933"> <summary> Do not audit attempts to send and receive apc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_apc_server_packets" lineno="8948"> <summary> Relabel packets to apc_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="8970"> <summary> Send and receive TCP traffic on the apcupsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_apcupsd_port" lineno="8989"> <summary> Send UDP traffic on the apcupsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="9008"> <summary> Do not audit attempts to send UDP traffic on the apcupsd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_apcupsd_port" lineno="9027"> <summary> Receive UDP traffic on the apcupsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="9046"> <summary> Do not audit attempts to receive UDP traffic on the apcupsd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_apcupsd_port" lineno="9065"> <summary> Send and receive UDP traffic on the apcupsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="9082"> <summary> Do not audit attempts to send and receive UDP traffic on the apcupsd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_apcupsd_port" lineno="9098"> <summary> Bind TCP sockets to the apcupsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_apcupsd_port" lineno="9118"> <summary> Bind UDP sockets to the apcupsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_apcupsd_port" lineno="9137"> <summary> Make a TCP connection to the apcupsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_apcupsd_client_packets" lineno="9157"> <summary> Send apcupsd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="9176"> <summary> Do not audit attempts to send apcupsd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_apcupsd_client_packets" lineno="9195"> <summary> Receive apcupsd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="9214"> <summary> Do not audit attempts to receive apcupsd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_apcupsd_client_packets" lineno="9233"> <summary> Send and receive apcupsd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="9249"> <summary> Do not audit attempts to send and receive apcupsd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_apcupsd_client_packets" lineno="9264"> <summary> Relabel packets to apcupsd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_apcupsd_server_packets" lineno="9284"> <summary> Send apcupsd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="9303"> <summary> Do not audit attempts to send apcupsd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_apcupsd_server_packets" lineno="9322"> <summary> Receive apcupsd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="9341"> <summary> Do not audit attempts to receive apcupsd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_apcupsd_server_packets" lineno="9360"> <summary> Send and receive apcupsd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="9376"> <summary> Do not audit attempts to send and receive apcupsd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_apcupsd_server_packets" lineno="9391"> <summary> Relabel packets to apcupsd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="9413"> <summary> Send and receive TCP traffic on the apertus_ldp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_apertus_ldp_port" lineno="9432"> <summary> Send UDP traffic on the apertus_ldp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="9451"> <summary> Do not audit attempts to send UDP traffic on the apertus_ldp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_apertus_ldp_port" lineno="9470"> <summary> Receive UDP traffic on the apertus_ldp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="9489"> <summary> Do not audit attempts to receive UDP traffic on the apertus_ldp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="9508"> <summary> Send and receive UDP traffic on the apertus_ldp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="9525"> <summary> Do not audit attempts to send and receive UDP traffic on the apertus_ldp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_apertus_ldp_port" lineno="9541"> <summary> Bind TCP sockets to the apertus_ldp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_apertus_ldp_port" lineno="9561"> <summary> Bind UDP sockets to the apertus_ldp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_apertus_ldp_port" lineno="9580"> <summary> Make a TCP connection to the apertus_ldp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_apertus_ldp_client_packets" lineno="9600"> <summary> Send apertus_ldp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="9619"> <summary> Do not audit attempts to send apertus_ldp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_apertus_ldp_client_packets" lineno="9638"> <summary> Receive apertus_ldp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="9657"> <summary> Do not audit attempts to receive apertus_ldp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="9676"> <summary> Send and receive apertus_ldp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="9692"> <summary> Do not audit attempts to send and receive apertus_ldp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="9707"> <summary> Relabel packets to apertus_ldp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_apertus_ldp_server_packets" lineno="9727"> <summary> Send apertus_ldp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="9746"> <summary> Do not audit attempts to send apertus_ldp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_apertus_ldp_server_packets" lineno="9765"> <summary> Receive apertus_ldp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="9784"> <summary> Do not audit attempts to receive apertus_ldp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="9803"> <summary> Send and receive apertus_ldp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="9819"> <summary> Do not audit attempts to send and receive apertus_ldp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="9834"> <summary> Relabel packets to apertus_ldp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_asterisk_port" lineno="9856"> <summary> Send and receive TCP traffic on the asterisk port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_asterisk_port" lineno="9875"> <summary> Send UDP traffic on the asterisk port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="9894"> <summary> Do not audit attempts to send UDP traffic on the asterisk port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_asterisk_port" lineno="9913"> <summary> Receive UDP traffic on the asterisk port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="9932"> <summary> Do not audit attempts to receive UDP traffic on the asterisk port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_asterisk_port" lineno="9951"> <summary> Send and receive UDP traffic on the asterisk port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="9968"> <summary> Do not audit attempts to send and receive UDP traffic on the asterisk port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_asterisk_port" lineno="9984"> <summary> Bind TCP sockets to the asterisk port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_asterisk_port" lineno="10004"> <summary> Bind UDP sockets to the asterisk port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_asterisk_port" lineno="10023"> <summary> Make a TCP connection to the asterisk port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_asterisk_client_packets" lineno="10043"> <summary> Send asterisk_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="10062"> <summary> Do not audit attempts to send asterisk_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_asterisk_client_packets" lineno="10081"> <summary> Receive asterisk_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="10100"> <summary> Do not audit attempts to receive asterisk_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_asterisk_client_packets" lineno="10119"> <summary> Send and receive asterisk_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="10135"> <summary> Do not audit attempts to send and receive asterisk_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_asterisk_client_packets" lineno="10150"> <summary> Relabel packets to asterisk_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_asterisk_server_packets" lineno="10170"> <summary> Send asterisk_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="10189"> <summary> Do not audit attempts to send asterisk_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_asterisk_server_packets" lineno="10208"> <summary> Receive asterisk_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="10227"> <summary> Do not audit attempts to receive asterisk_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_asterisk_server_packets" lineno="10246"> <summary> Send and receive asterisk_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="10262"> <summary> Do not audit attempts to send and receive asterisk_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_asterisk_server_packets" lineno="10277"> <summary> Relabel packets to asterisk_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_audit_port" lineno="10299"> <summary> Send and receive TCP traffic on the audit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_audit_port" lineno="10318"> <summary> Send UDP traffic on the audit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_audit_port" lineno="10337"> <summary> Do not audit attempts to send UDP traffic on the audit port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_audit_port" lineno="10356"> <summary> Receive UDP traffic on the audit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_audit_port" lineno="10375"> <summary> Do not audit attempts to receive UDP traffic on the audit port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_audit_port" lineno="10394"> <summary> Send and receive UDP traffic on the audit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="10411"> <summary> Do not audit attempts to send and receive UDP traffic on the audit port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_audit_port" lineno="10427"> <summary> Bind TCP sockets to the audit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_audit_port" lineno="10447"> <summary> Bind UDP sockets to the audit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_audit_port" lineno="10466"> <summary> Make a TCP connection to the audit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_audit_client_packets" lineno="10486"> <summary> Send audit_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_audit_client_packets" lineno="10505"> <summary> Do not audit attempts to send audit_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_audit_client_packets" lineno="10524"> <summary> Receive audit_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_audit_client_packets" lineno="10543"> <summary> Do not audit attempts to receive audit_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_audit_client_packets" lineno="10562"> <summary> Send and receive audit_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="10578"> <summary> Do not audit attempts to send and receive audit_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_audit_client_packets" lineno="10593"> <summary> Relabel packets to audit_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_audit_server_packets" lineno="10613"> <summary> Send audit_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_audit_server_packets" lineno="10632"> <summary> Do not audit attempts to send audit_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_audit_server_packets" lineno="10651"> <summary> Receive audit_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_audit_server_packets" lineno="10670"> <summary> Do not audit attempts to receive audit_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_audit_server_packets" lineno="10689"> <summary> Send and receive audit_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="10705"> <summary> Do not audit attempts to send and receive audit_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_audit_server_packets" lineno="10720"> <summary> Relabel packets to audit_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_auth_port" lineno="10742"> <summary> Send and receive TCP traffic on the auth port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_auth_port" lineno="10761"> <summary> Send UDP traffic on the auth port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_auth_port" lineno="10780"> <summary> Do not audit attempts to send UDP traffic on the auth port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_auth_port" lineno="10799"> <summary> Receive UDP traffic on the auth port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_auth_port" lineno="10818"> <summary> Do not audit attempts to receive UDP traffic on the auth port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_auth_port" lineno="10837"> <summary> Send and receive UDP traffic on the auth port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="10854"> <summary> Do not audit attempts to send and receive UDP traffic on the auth port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_auth_port" lineno="10870"> <summary> Bind TCP sockets to the auth port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_auth_port" lineno="10890"> <summary> Bind UDP sockets to the auth port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_auth_port" lineno="10909"> <summary> Make a TCP connection to the auth port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_auth_client_packets" lineno="10929"> <summary> Send auth_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_auth_client_packets" lineno="10948"> <summary> Do not audit attempts to send auth_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_auth_client_packets" lineno="10967"> <summary> Receive auth_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_auth_client_packets" lineno="10986"> <summary> Do not audit attempts to receive auth_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_auth_client_packets" lineno="11005"> <summary> Send and receive auth_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="11021"> <summary> Do not audit attempts to send and receive auth_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_auth_client_packets" lineno="11036"> <summary> Relabel packets to auth_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_auth_server_packets" lineno="11056"> <summary> Send auth_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_auth_server_packets" lineno="11075"> <summary> Do not audit attempts to send auth_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_auth_server_packets" lineno="11094"> <summary> Receive auth_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_auth_server_packets" lineno="11113"> <summary> Do not audit attempts to receive auth_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_auth_server_packets" lineno="11132"> <summary> Send and receive auth_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="11148"> <summary> Do not audit attempts to send and receive auth_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_auth_server_packets" lineno="11163"> <summary> Relabel packets to auth_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_bacula_port" lineno="11185"> <summary> Send and receive TCP traffic on the bacula port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_bacula_port" lineno="11204"> <summary> Send UDP traffic on the bacula port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_bacula_port" lineno="11223"> <summary> Do not audit attempts to send UDP traffic on the bacula port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_bacula_port" lineno="11242"> <summary> Receive UDP traffic on the bacula port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_bacula_port" lineno="11261"> <summary> Do not audit attempts to receive UDP traffic on the bacula port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_bacula_port" lineno="11280"> <summary> Send and receive UDP traffic on the bacula port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_bacula_port" lineno="11297"> <summary> Do not audit attempts to send and receive UDP traffic on the bacula port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_bacula_port" lineno="11313"> <summary> Bind TCP sockets to the bacula port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_bacula_port" lineno="11333"> <summary> Bind UDP sockets to the bacula port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_bacula_port" lineno="11352"> <summary> Make a TCP connection to the bacula port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_bacula_client_packets" lineno="11372"> <summary> Send bacula_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_bacula_client_packets" lineno="11391"> <summary> Do not audit attempts to send bacula_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_bacula_client_packets" lineno="11410"> <summary> Receive bacula_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_bacula_client_packets" lineno="11429"> <summary> Do not audit attempts to receive bacula_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_bacula_client_packets" lineno="11448"> <summary> Send and receive bacula_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_bacula_client_packets" lineno="11464"> <summary> Do not audit attempts to send and receive bacula_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_bacula_client_packets" lineno="11479"> <summary> Relabel packets to bacula_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_bacula_server_packets" lineno="11499"> <summary> Send bacula_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_bacula_server_packets" lineno="11518"> <summary> Do not audit attempts to send bacula_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_bacula_server_packets" lineno="11537"> <summary> Receive bacula_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_bacula_server_packets" lineno="11556"> <summary> Do not audit attempts to receive bacula_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_bacula_server_packets" lineno="11575"> <summary> Send and receive bacula_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_bacula_server_packets" lineno="11591"> <summary> Do not audit attempts to send and receive bacula_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_bacula_server_packets" lineno="11606"> <summary> Relabel packets to bacula_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_bgp_port" lineno="11628"> <summary> Send and receive TCP traffic on the bgp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_bgp_port" lineno="11647"> <summary> Send UDP traffic on the bgp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_bgp_port" lineno="11666"> <summary> Do not audit attempts to send UDP traffic on the bgp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_bgp_port" lineno="11685"> <summary> Receive UDP traffic on the bgp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="11704"> <summary> Do not audit attempts to receive UDP traffic on the bgp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_bgp_port" lineno="11723"> <summary> Send and receive UDP traffic on the bgp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="11740"> <summary> Do not audit attempts to send and receive UDP traffic on the bgp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_bgp_port" lineno="11756"> <summary> Bind TCP sockets to the bgp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_bgp_port" lineno="11776"> <summary> Bind UDP sockets to the bgp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_bgp_port" lineno="11795"> <summary> Make a TCP connection to the bgp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_bgp_client_packets" lineno="11815"> <summary> Send bgp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_bgp_client_packets" lineno="11834"> <summary> Do not audit attempts to send bgp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_bgp_client_packets" lineno="11853"> <summary> Receive bgp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="11872"> <summary> Do not audit attempts to receive bgp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_bgp_client_packets" lineno="11891"> <summary> Send and receive bgp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="11907"> <summary> Do not audit attempts to send and receive bgp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_bgp_client_packets" lineno="11922"> <summary> Relabel packets to bgp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_bgp_server_packets" lineno="11942"> <summary> Send bgp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_bgp_server_packets" lineno="11961"> <summary> Do not audit attempts to send bgp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_bgp_server_packets" lineno="11980"> <summary> Receive bgp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="11999"> <summary> Do not audit attempts to receive bgp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_bgp_server_packets" lineno="12018"> <summary> Send and receive bgp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="12034"> <summary> Do not audit attempts to send and receive bgp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_bgp_server_packets" lineno="12049"> <summary> Relabel packets to bgp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_boinc_port" lineno="12071"> <summary> Send and receive TCP traffic on the boinc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_boinc_port" lineno="12090"> <summary> Send UDP traffic on the boinc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_boinc_port" lineno="12109"> <summary> Do not audit attempts to send UDP traffic on the boinc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_boinc_port" lineno="12128"> <summary> Receive UDP traffic on the boinc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="12147"> <summary> Do not audit attempts to receive UDP traffic on the boinc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_boinc_port" lineno="12166"> <summary> Send and receive UDP traffic on the boinc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="12183"> <summary> Do not audit attempts to send and receive UDP traffic on the boinc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_boinc_port" lineno="12199"> <summary> Bind TCP sockets to the boinc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_boinc_port" lineno="12219"> <summary> Bind UDP sockets to the boinc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_boinc_port" lineno="12238"> <summary> Make a TCP connection to the boinc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_boinc_client_packets" lineno="12258"> <summary> Send boinc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_boinc_client_packets" lineno="12277"> <summary> Do not audit attempts to send boinc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_boinc_client_packets" lineno="12296"> <summary> Receive boinc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="12315"> <summary> Do not audit attempts to receive boinc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_boinc_client_packets" lineno="12334"> <summary> Send and receive boinc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="12350"> <summary> Do not audit attempts to send and receive boinc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_boinc_client_packets" lineno="12365"> <summary> Relabel packets to boinc_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_boinc_server_packets" lineno="12385"> <summary> Send boinc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_boinc_server_packets" lineno="12404"> <summary> Do not audit attempts to send boinc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_boinc_server_packets" lineno="12423"> <summary> Receive boinc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="12442"> <summary> Do not audit attempts to receive boinc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_boinc_server_packets" lineno="12461"> <summary> Send and receive boinc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="12477"> <summary> Do not audit attempts to send and receive boinc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_boinc_server_packets" lineno="12492"> <summary> Relabel packets to boinc_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_certmaster_port" lineno="12514"> <summary> Send and receive TCP traffic on the certmaster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_certmaster_port" lineno="12533"> <summary> Send UDP traffic on the certmaster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="12552"> <summary> Do not audit attempts to send UDP traffic on the certmaster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_certmaster_port" lineno="12571"> <summary> Receive UDP traffic on the certmaster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="12590"> <summary> Do not audit attempts to receive UDP traffic on the certmaster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_certmaster_port" lineno="12609"> <summary> Send and receive UDP traffic on the certmaster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="12626"> <summary> Do not audit attempts to send and receive UDP traffic on the certmaster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_certmaster_port" lineno="12642"> <summary> Bind TCP sockets to the certmaster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_certmaster_port" lineno="12662"> <summary> Bind UDP sockets to the certmaster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_certmaster_port" lineno="12681"> <summary> Make a TCP connection to the certmaster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_certmaster_client_packets" lineno="12701"> <summary> Send certmaster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="12720"> <summary> Do not audit attempts to send certmaster_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_certmaster_client_packets" lineno="12739"> <summary> Receive certmaster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="12758"> <summary> Do not audit attempts to receive certmaster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_certmaster_client_packets" lineno="12777"> <summary> Send and receive certmaster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="12793"> <summary> Do not audit attempts to send and receive certmaster_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_certmaster_client_packets" lineno="12808"> <summary> Relabel packets to certmaster_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_certmaster_server_packets" lineno="12828"> <summary> Send certmaster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="12847"> <summary> Do not audit attempts to send certmaster_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_certmaster_server_packets" lineno="12866"> <summary> Receive certmaster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="12885"> <summary> Do not audit attempts to receive certmaster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_certmaster_server_packets" lineno="12904"> <summary> Send and receive certmaster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="12920"> <summary> Do not audit attempts to send and receive certmaster_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_certmaster_server_packets" lineno="12935"> <summary> Relabel packets to certmaster_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_cockpit_port" lineno="12957"> <summary> Send and receive TCP traffic on the cockpit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_cockpit_port" lineno="12976"> <summary> Send UDP traffic on the cockpit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_cockpit_port" lineno="12995"> <summary> Do not audit attempts to send UDP traffic on the cockpit port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_cockpit_port" lineno="13014"> <summary> Receive UDP traffic on the cockpit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_cockpit_port" lineno="13033"> <summary> Do not audit attempts to receive UDP traffic on the cockpit port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_cockpit_port" lineno="13052"> <summary> Send and receive UDP traffic on the cockpit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_cockpit_port" lineno="13069"> <summary> Do not audit attempts to send and receive UDP traffic on the cockpit port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_cockpit_port" lineno="13085"> <summary> Bind TCP sockets to the cockpit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_cockpit_port" lineno="13105"> <summary> Bind UDP sockets to the cockpit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_cockpit_port" lineno="13124"> <summary> Make a TCP connection to the cockpit port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cockpit_client_packets" lineno="13144"> <summary> Send cockpit_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cockpit_client_packets" lineno="13163"> <summary> Do not audit attempts to send cockpit_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cockpit_client_packets" lineno="13182"> <summary> Receive cockpit_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cockpit_client_packets" lineno="13201"> <summary> Do not audit attempts to receive cockpit_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cockpit_client_packets" lineno="13220"> <summary> Send and receive cockpit_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cockpit_client_packets" lineno="13236"> <summary> Do not audit attempts to send and receive cockpit_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cockpit_client_packets" lineno="13251"> <summary> Relabel packets to cockpit_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cockpit_server_packets" lineno="13271"> <summary> Send cockpit_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cockpit_server_packets" lineno="13290"> <summary> Do not audit attempts to send cockpit_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cockpit_server_packets" lineno="13309"> <summary> Receive cockpit_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cockpit_server_packets" lineno="13328"> <summary> Do not audit attempts to receive cockpit_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cockpit_server_packets" lineno="13347"> <summary> Send and receive cockpit_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cockpit_server_packets" lineno="13363"> <summary> Do not audit attempts to send and receive cockpit_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cockpit_server_packets" lineno="13378"> <summary> Relabel packets to cockpit_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_collectd_port" lineno="13400"> <summary> Send and receive TCP traffic on the collectd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_collectd_port" lineno="13419"> <summary> Send UDP traffic on the collectd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_collectd_port" lineno="13438"> <summary> Do not audit attempts to send UDP traffic on the collectd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_collectd_port" lineno="13457"> <summary> Receive UDP traffic on the collectd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_collectd_port" lineno="13476"> <summary> Do not audit attempts to receive UDP traffic on the collectd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_collectd_port" lineno="13495"> <summary> Send and receive UDP traffic on the collectd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_collectd_port" lineno="13512"> <summary> Do not audit attempts to send and receive UDP traffic on the collectd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_collectd_port" lineno="13528"> <summary> Bind TCP sockets to the collectd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_collectd_port" lineno="13548"> <summary> Bind UDP sockets to the collectd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_collectd_port" lineno="13567"> <summary> Make a TCP connection to the collectd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_collectd_client_packets" lineno="13587"> <summary> Send collectd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_collectd_client_packets" lineno="13606"> <summary> Do not audit attempts to send collectd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_collectd_client_packets" lineno="13625"> <summary> Receive collectd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_collectd_client_packets" lineno="13644"> <summary> Do not audit attempts to receive collectd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_collectd_client_packets" lineno="13663"> <summary> Send and receive collectd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_collectd_client_packets" lineno="13679"> <summary> Do not audit attempts to send and receive collectd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_collectd_client_packets" lineno="13694"> <summary> Relabel packets to collectd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_collectd_server_packets" lineno="13714"> <summary> Send collectd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_collectd_server_packets" lineno="13733"> <summary> Do not audit attempts to send collectd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_collectd_server_packets" lineno="13752"> <summary> Receive collectd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_collectd_server_packets" lineno="13771"> <summary> Do not audit attempts to receive collectd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_collectd_server_packets" lineno="13790"> <summary> Send and receive collectd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_collectd_server_packets" lineno="13806"> <summary> Do not audit attempts to send and receive collectd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_collectd_server_packets" lineno="13821"> <summary> Relabel packets to collectd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_chronyd_port" lineno="13843"> <summary> Send and receive TCP traffic on the chronyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_chronyd_port" lineno="13862"> <summary> Send UDP traffic on the chronyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="13881"> <summary> Do not audit attempts to send UDP traffic on the chronyd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_chronyd_port" lineno="13900"> <summary> Receive UDP traffic on the chronyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="13919"> <summary> Do not audit attempts to receive UDP traffic on the chronyd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_chronyd_port" lineno="13938"> <summary> Send and receive UDP traffic on the chronyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="13955"> <summary> Do not audit attempts to send and receive UDP traffic on the chronyd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_chronyd_port" lineno="13971"> <summary> Bind TCP sockets to the chronyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_chronyd_port" lineno="13991"> <summary> Bind UDP sockets to the chronyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_chronyd_port" lineno="14010"> <summary> Make a TCP connection to the chronyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_chronyd_client_packets" lineno="14030"> <summary> Send chronyd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="14049"> <summary> Do not audit attempts to send chronyd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_chronyd_client_packets" lineno="14068"> <summary> Receive chronyd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="14087"> <summary> Do not audit attempts to receive chronyd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_chronyd_client_packets" lineno="14106"> <summary> Send and receive chronyd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="14122"> <summary> Do not audit attempts to send and receive chronyd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_chronyd_client_packets" lineno="14137"> <summary> Relabel packets to chronyd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_chronyd_server_packets" lineno="14157"> <summary> Send chronyd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="14176"> <summary> Do not audit attempts to send chronyd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_chronyd_server_packets" lineno="14195"> <summary> Receive chronyd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="14214"> <summary> Do not audit attempts to receive chronyd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_chronyd_server_packets" lineno="14233"> <summary> Send and receive chronyd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="14249"> <summary> Do not audit attempts to send and receive chronyd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_chronyd_server_packets" lineno="14264"> <summary> Relabel packets to chronyd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_clamd_port" lineno="14286"> <summary> Send and receive TCP traffic on the clamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_clamd_port" lineno="14305"> <summary> Send UDP traffic on the clamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_clamd_port" lineno="14324"> <summary> Do not audit attempts to send UDP traffic on the clamd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_clamd_port" lineno="14343"> <summary> Receive UDP traffic on the clamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="14362"> <summary> Do not audit attempts to receive UDP traffic on the clamd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_clamd_port" lineno="14381"> <summary> Send and receive UDP traffic on the clamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="14398"> <summary> Do not audit attempts to send and receive UDP traffic on the clamd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_clamd_port" lineno="14414"> <summary> Bind TCP sockets to the clamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_clamd_port" lineno="14434"> <summary> Bind UDP sockets to the clamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_clamd_port" lineno="14453"> <summary> Make a TCP connection to the clamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_clamd_client_packets" lineno="14473"> <summary> Send clamd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_clamd_client_packets" lineno="14492"> <summary> Do not audit attempts to send clamd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_clamd_client_packets" lineno="14511"> <summary> Receive clamd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="14530"> <summary> Do not audit attempts to receive clamd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_clamd_client_packets" lineno="14549"> <summary> Send and receive clamd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="14565"> <summary> Do not audit attempts to send and receive clamd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_clamd_client_packets" lineno="14580"> <summary> Relabel packets to clamd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_clamd_server_packets" lineno="14600"> <summary> Send clamd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_clamd_server_packets" lineno="14619"> <summary> Do not audit attempts to send clamd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_clamd_server_packets" lineno="14638"> <summary> Receive clamd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="14657"> <summary> Do not audit attempts to receive clamd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_clamd_server_packets" lineno="14676"> <summary> Send and receive clamd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="14692"> <summary> Do not audit attempts to send and receive clamd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_clamd_server_packets" lineno="14707"> <summary> Relabel packets to clamd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="14729"> <summary> Send and receive TCP traffic on the clockspeed port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_clockspeed_port" lineno="14748"> <summary> Send UDP traffic on the clockspeed port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="14767"> <summary> Do not audit attempts to send UDP traffic on the clockspeed port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_clockspeed_port" lineno="14786"> <summary> Receive UDP traffic on the clockspeed port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="14805"> <summary> Do not audit attempts to receive UDP traffic on the clockspeed port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_clockspeed_port" lineno="14824"> <summary> Send and receive UDP traffic on the clockspeed port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="14841"> <summary> Do not audit attempts to send and receive UDP traffic on the clockspeed port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_clockspeed_port" lineno="14857"> <summary> Bind TCP sockets to the clockspeed port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_clockspeed_port" lineno="14877"> <summary> Bind UDP sockets to the clockspeed port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_clockspeed_port" lineno="14896"> <summary> Make a TCP connection to the clockspeed port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_clockspeed_client_packets" lineno="14916"> <summary> Send clockspeed_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="14935"> <summary> Do not audit attempts to send clockspeed_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_clockspeed_client_packets" lineno="14954"> <summary> Receive clockspeed_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="14973"> <summary> Do not audit attempts to receive clockspeed_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_clockspeed_client_packets" lineno="14992"> <summary> Send and receive clockspeed_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="15008"> <summary> Do not audit attempts to send and receive clockspeed_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_clockspeed_client_packets" lineno="15023"> <summary> Relabel packets to clockspeed_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_clockspeed_server_packets" lineno="15043"> <summary> Send clockspeed_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="15062"> <summary> Do not audit attempts to send clockspeed_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_clockspeed_server_packets" lineno="15081"> <summary> Receive clockspeed_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="15100"> <summary> Do not audit attempts to receive clockspeed_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_clockspeed_server_packets" lineno="15119"> <summary> Send and receive clockspeed_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="15135"> <summary> Do not audit attempts to send and receive clockspeed_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_clockspeed_server_packets" lineno="15150"> <summary> Relabel packets to clockspeed_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_cluster_port" lineno="15172"> <summary> Send and receive TCP traffic on the cluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_cluster_port" lineno="15191"> <summary> Send UDP traffic on the cluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_cluster_port" lineno="15210"> <summary> Do not audit attempts to send UDP traffic on the cluster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_cluster_port" lineno="15229"> <summary> Receive UDP traffic on the cluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="15248"> <summary> Do not audit attempts to receive UDP traffic on the cluster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_cluster_port" lineno="15267"> <summary> Send and receive UDP traffic on the cluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="15284"> <summary> Do not audit attempts to send and receive UDP traffic on the cluster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_cluster_port" lineno="15300"> <summary> Bind TCP sockets to the cluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_cluster_port" lineno="15320"> <summary> Bind UDP sockets to the cluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_cluster_port" lineno="15339"> <summary> Make a TCP connection to the cluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cluster_client_packets" lineno="15359"> <summary> Send cluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cluster_client_packets" lineno="15378"> <summary> Do not audit attempts to send cluster_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cluster_client_packets" lineno="15397"> <summary> Receive cluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="15416"> <summary> Do not audit attempts to receive cluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cluster_client_packets" lineno="15435"> <summary> Send and receive cluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="15451"> <summary> Do not audit attempts to send and receive cluster_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cluster_client_packets" lineno="15466"> <summary> Relabel packets to cluster_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cluster_server_packets" lineno="15486"> <summary> Send cluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cluster_server_packets" lineno="15505"> <summary> Do not audit attempts to send cluster_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cluster_server_packets" lineno="15524"> <summary> Receive cluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="15543"> <summary> Do not audit attempts to receive cluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cluster_server_packets" lineno="15562"> <summary> Send and receive cluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="15578"> <summary> Do not audit attempts to send and receive cluster_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cluster_server_packets" lineno="15593"> <summary> Relabel packets to cluster_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_cma_port" lineno="15615"> <summary> Send and receive TCP traffic on the cma port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_cma_port" lineno="15634"> <summary> Send UDP traffic on the cma port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_cma_port" lineno="15653"> <summary> Do not audit attempts to send UDP traffic on the cma port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_cma_port" lineno="15672"> <summary> Receive UDP traffic on the cma port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_cma_port" lineno="15691"> <summary> Do not audit attempts to receive UDP traffic on the cma port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_cma_port" lineno="15710"> <summary> Send and receive UDP traffic on the cma port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="15727"> <summary> Do not audit attempts to send and receive UDP traffic on the cma port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_cma_port" lineno="15743"> <summary> Bind TCP sockets to the cma port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_cma_port" lineno="15763"> <summary> Bind UDP sockets to the cma port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_cma_port" lineno="15782"> <summary> Make a TCP connection to the cma port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cma_client_packets" lineno="15802"> <summary> Send cma_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cma_client_packets" lineno="15821"> <summary> Do not audit attempts to send cma_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cma_client_packets" lineno="15840"> <summary> Receive cma_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cma_client_packets" lineno="15859"> <summary> Do not audit attempts to receive cma_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cma_client_packets" lineno="15878"> <summary> Send and receive cma_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="15894"> <summary> Do not audit attempts to send and receive cma_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cma_client_packets" lineno="15909"> <summary> Relabel packets to cma_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cma_server_packets" lineno="15929"> <summary> Send cma_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cma_server_packets" lineno="15948"> <summary> Do not audit attempts to send cma_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cma_server_packets" lineno="15967"> <summary> Receive cma_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cma_server_packets" lineno="15986"> <summary> Do not audit attempts to receive cma_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cma_server_packets" lineno="16005"> <summary> Send and receive cma_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="16021"> <summary> Do not audit attempts to send and receive cma_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cma_server_packets" lineno="16036"> <summary> Relabel packets to cma_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_cobbler_port" lineno="16058"> <summary> Send and receive TCP traffic on the cobbler port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_cobbler_port" lineno="16077"> <summary> Send UDP traffic on the cobbler port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="16096"> <summary> Do not audit attempts to send UDP traffic on the cobbler port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_cobbler_port" lineno="16115"> <summary> Receive UDP traffic on the cobbler port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="16134"> <summary> Do not audit attempts to receive UDP traffic on the cobbler port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_cobbler_port" lineno="16153"> <summary> Send and receive UDP traffic on the cobbler port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="16170"> <summary> Do not audit attempts to send and receive UDP traffic on the cobbler port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_cobbler_port" lineno="16186"> <summary> Bind TCP sockets to the cobbler port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_cobbler_port" lineno="16206"> <summary> Bind UDP sockets to the cobbler port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_cobbler_port" lineno="16225"> <summary> Make a TCP connection to the cobbler port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cobbler_client_packets" lineno="16245"> <summary> Send cobbler_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="16264"> <summary> Do not audit attempts to send cobbler_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cobbler_client_packets" lineno="16283"> <summary> Receive cobbler_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="16302"> <summary> Do not audit attempts to receive cobbler_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cobbler_client_packets" lineno="16321"> <summary> Send and receive cobbler_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="16337"> <summary> Do not audit attempts to send and receive cobbler_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cobbler_client_packets" lineno="16352"> <summary> Relabel packets to cobbler_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cobbler_server_packets" lineno="16372"> <summary> Send cobbler_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="16391"> <summary> Do not audit attempts to send cobbler_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cobbler_server_packets" lineno="16410"> <summary> Receive cobbler_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="16429"> <summary> Do not audit attempts to receive cobbler_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cobbler_server_packets" lineno="16448"> <summary> Send and receive cobbler_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="16464"> <summary> Do not audit attempts to send and receive cobbler_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cobbler_server_packets" lineno="16479"> <summary> Relabel packets to cobbler_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_commplex_port" lineno="16501"> <summary> Send and receive TCP traffic on the commplex port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_commplex_port" lineno="16520"> <summary> Send UDP traffic on the commplex port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_commplex_port" lineno="16539"> <summary> Do not audit attempts to send UDP traffic on the commplex port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_commplex_port" lineno="16558"> <summary> Receive UDP traffic on the commplex port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_commplex_port" lineno="16577"> <summary> Do not audit attempts to receive UDP traffic on the commplex port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_commplex_port" lineno="16596"> <summary> Send and receive UDP traffic on the commplex port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_commplex_port" lineno="16613"> <summary> Do not audit attempts to send and receive UDP traffic on the commplex port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_commplex_port" lineno="16629"> <summary> Bind TCP sockets to the commplex port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_commplex_port" lineno="16649"> <summary> Bind UDP sockets to the commplex port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_commplex_port" lineno="16668"> <summary> Make a TCP connection to the commplex port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_commplex_client_packets" lineno="16688"> <summary> Send commplex_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_commplex_client_packets" lineno="16707"> <summary> Do not audit attempts to send commplex_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_commplex_client_packets" lineno="16726"> <summary> Receive commplex_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_commplex_client_packets" lineno="16745"> <summary> Do not audit attempts to receive commplex_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_commplex_client_packets" lineno="16764"> <summary> Send and receive commplex_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_commplex_client_packets" lineno="16780"> <summary> Do not audit attempts to send and receive commplex_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_commplex_client_packets" lineno="16795"> <summary> Relabel packets to commplex_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_commplex_server_packets" lineno="16815"> <summary> Send commplex_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_commplex_server_packets" lineno="16834"> <summary> Do not audit attempts to send commplex_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_commplex_server_packets" lineno="16853"> <summary> Receive commplex_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_commplex_server_packets" lineno="16872"> <summary> Do not audit attempts to receive commplex_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_commplex_server_packets" lineno="16891"> <summary> Send and receive commplex_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_commplex_server_packets" lineno="16907"> <summary> Do not audit attempts to send and receive commplex_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_commplex_server_packets" lineno="16922"> <summary> Relabel packets to commplex_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_comsat_port" lineno="16944"> <summary> Send and receive TCP traffic on the comsat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_comsat_port" lineno="16963"> <summary> Send UDP traffic on the comsat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_comsat_port" lineno="16982"> <summary> Do not audit attempts to send UDP traffic on the comsat port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_comsat_port" lineno="17001"> <summary> Receive UDP traffic on the comsat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="17020"> <summary> Do not audit attempts to receive UDP traffic on the comsat port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_comsat_port" lineno="17039"> <summary> Send and receive UDP traffic on the comsat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="17056"> <summary> Do not audit attempts to send and receive UDP traffic on the comsat port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_comsat_port" lineno="17072"> <summary> Bind TCP sockets to the comsat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_comsat_port" lineno="17092"> <summary> Bind UDP sockets to the comsat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_comsat_port" lineno="17111"> <summary> Make a TCP connection to the comsat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_comsat_client_packets" lineno="17131"> <summary> Send comsat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_comsat_client_packets" lineno="17150"> <summary> Do not audit attempts to send comsat_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_comsat_client_packets" lineno="17169"> <summary> Receive comsat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="17188"> <summary> Do not audit attempts to receive comsat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_comsat_client_packets" lineno="17207"> <summary> Send and receive comsat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="17223"> <summary> Do not audit attempts to send and receive comsat_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_comsat_client_packets" lineno="17238"> <summary> Relabel packets to comsat_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_comsat_server_packets" lineno="17258"> <summary> Send comsat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_comsat_server_packets" lineno="17277"> <summary> Do not audit attempts to send comsat_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_comsat_server_packets" lineno="17296"> <summary> Receive comsat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="17315"> <summary> Do not audit attempts to receive comsat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_comsat_server_packets" lineno="17334"> <summary> Send and receive comsat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="17350"> <summary> Do not audit attempts to send and receive comsat_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_comsat_server_packets" lineno="17365"> <summary> Relabel packets to comsat_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_condor_port" lineno="17387"> <summary> Send and receive TCP traffic on the condor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_condor_port" lineno="17406"> <summary> Send UDP traffic on the condor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_condor_port" lineno="17425"> <summary> Do not audit attempts to send UDP traffic on the condor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_condor_port" lineno="17444"> <summary> Receive UDP traffic on the condor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_condor_port" lineno="17463"> <summary> Do not audit attempts to receive UDP traffic on the condor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_condor_port" lineno="17482"> <summary> Send and receive UDP traffic on the condor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="17499"> <summary> Do not audit attempts to send and receive UDP traffic on the condor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_condor_port" lineno="17515"> <summary> Bind TCP sockets to the condor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_condor_port" lineno="17535"> <summary> Bind UDP sockets to the condor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_condor_port" lineno="17554"> <summary> Make a TCP connection to the condor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_condor_client_packets" lineno="17574"> <summary> Send condor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_condor_client_packets" lineno="17593"> <summary> Do not audit attempts to send condor_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_condor_client_packets" lineno="17612"> <summary> Receive condor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_condor_client_packets" lineno="17631"> <summary> Do not audit attempts to receive condor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_condor_client_packets" lineno="17650"> <summary> Send and receive condor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="17666"> <summary> Do not audit attempts to send and receive condor_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_condor_client_packets" lineno="17681"> <summary> Relabel packets to condor_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_condor_server_packets" lineno="17701"> <summary> Send condor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_condor_server_packets" lineno="17720"> <summary> Do not audit attempts to send condor_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_condor_server_packets" lineno="17739"> <summary> Receive condor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_condor_server_packets" lineno="17758"> <summary> Do not audit attempts to receive condor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_condor_server_packets" lineno="17777"> <summary> Send and receive condor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="17793"> <summary> Do not audit attempts to send and receive condor_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_condor_server_packets" lineno="17808"> <summary> Relabel packets to condor_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_conman_port" lineno="17830"> <summary> Send and receive TCP traffic on the conman port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_conman_port" lineno="17849"> <summary> Send UDP traffic on the conman port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_conman_port" lineno="17868"> <summary> Do not audit attempts to send UDP traffic on the conman port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_conman_port" lineno="17887"> <summary> Receive UDP traffic on the conman port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_conman_port" lineno="17906"> <summary> Do not audit attempts to receive UDP traffic on the conman port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_conman_port" lineno="17925"> <summary> Send and receive UDP traffic on the conman port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_conman_port" lineno="17942"> <summary> Do not audit attempts to send and receive UDP traffic on the conman port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_conman_port" lineno="17958"> <summary> Bind TCP sockets to the conman port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_conman_port" lineno="17978"> <summary> Bind UDP sockets to the conman port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_conman_port" lineno="17997"> <summary> Make a TCP connection to the conman port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_conman_client_packets" lineno="18017"> <summary> Send conman_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_conman_client_packets" lineno="18036"> <summary> Do not audit attempts to send conman_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_conman_client_packets" lineno="18055"> <summary> Receive conman_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_conman_client_packets" lineno="18074"> <summary> Do not audit attempts to receive conman_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_conman_client_packets" lineno="18093"> <summary> Send and receive conman_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_conman_client_packets" lineno="18109"> <summary> Do not audit attempts to send and receive conman_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_conman_client_packets" lineno="18124"> <summary> Relabel packets to conman_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_conman_server_packets" lineno="18144"> <summary> Send conman_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_conman_server_packets" lineno="18163"> <summary> Do not audit attempts to send conman_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_conman_server_packets" lineno="18182"> <summary> Receive conman_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_conman_server_packets" lineno="18201"> <summary> Do not audit attempts to receive conman_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_conman_server_packets" lineno="18220"> <summary> Send and receive conman_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_conman_server_packets" lineno="18236"> <summary> Do not audit attempts to send and receive conman_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_conman_server_packets" lineno="18251"> <summary> Relabel packets to conman_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ctdb_port" lineno="18273"> <summary> Send and receive TCP traffic on the ctdb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ctdb_port" lineno="18292"> <summary> Send UDP traffic on the ctdb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="18311"> <summary> Do not audit attempts to send UDP traffic on the ctdb port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ctdb_port" lineno="18330"> <summary> Receive UDP traffic on the ctdb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="18349"> <summary> Do not audit attempts to receive UDP traffic on the ctdb port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ctdb_port" lineno="18368"> <summary> Send and receive UDP traffic on the ctdb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="18385"> <summary> Do not audit attempts to send and receive UDP traffic on the ctdb port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ctdb_port" lineno="18401"> <summary> Bind TCP sockets to the ctdb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ctdb_port" lineno="18421"> <summary> Bind UDP sockets to the ctdb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ctdb_port" lineno="18440"> <summary> Make a TCP connection to the ctdb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ctdb_client_packets" lineno="18460"> <summary> Send ctdb_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="18479"> <summary> Do not audit attempts to send ctdb_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ctdb_client_packets" lineno="18498"> <summary> Receive ctdb_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="18517"> <summary> Do not audit attempts to receive ctdb_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ctdb_client_packets" lineno="18536"> <summary> Send and receive ctdb_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="18552"> <summary> Do not audit attempts to send and receive ctdb_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ctdb_client_packets" lineno="18567"> <summary> Relabel packets to ctdb_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ctdb_server_packets" lineno="18587"> <summary> Send ctdb_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="18606"> <summary> Do not audit attempts to send ctdb_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ctdb_server_packets" lineno="18625"> <summary> Receive ctdb_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="18644"> <summary> Do not audit attempts to receive ctdb_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ctdb_server_packets" lineno="18663"> <summary> Send and receive ctdb_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="18679"> <summary> Do not audit attempts to send and receive ctdb_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ctdb_server_packets" lineno="18694"> <summary> Relabel packets to ctdb_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_cvs_port" lineno="18716"> <summary> Send and receive TCP traffic on the cvs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_cvs_port" lineno="18735"> <summary> Send UDP traffic on the cvs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_cvs_port" lineno="18754"> <summary> Do not audit attempts to send UDP traffic on the cvs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_cvs_port" lineno="18773"> <summary> Receive UDP traffic on the cvs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="18792"> <summary> Do not audit attempts to receive UDP traffic on the cvs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_cvs_port" lineno="18811"> <summary> Send and receive UDP traffic on the cvs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="18828"> <summary> Do not audit attempts to send and receive UDP traffic on the cvs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_cvs_port" lineno="18844"> <summary> Bind TCP sockets to the cvs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_cvs_port" lineno="18864"> <summary> Bind UDP sockets to the cvs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_cvs_port" lineno="18883"> <summary> Make a TCP connection to the cvs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cvs_client_packets" lineno="18903"> <summary> Send cvs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cvs_client_packets" lineno="18922"> <summary> Do not audit attempts to send cvs_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cvs_client_packets" lineno="18941"> <summary> Receive cvs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="18960"> <summary> Do not audit attempts to receive cvs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cvs_client_packets" lineno="18979"> <summary> Send and receive cvs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="18995"> <summary> Do not audit attempts to send and receive cvs_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cvs_client_packets" lineno="19010"> <summary> Relabel packets to cvs_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cvs_server_packets" lineno="19030"> <summary> Send cvs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cvs_server_packets" lineno="19049"> <summary> Do not audit attempts to send cvs_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cvs_server_packets" lineno="19068"> <summary> Receive cvs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="19087"> <summary> Do not audit attempts to receive cvs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cvs_server_packets" lineno="19106"> <summary> Send and receive cvs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="19122"> <summary> Do not audit attempts to send and receive cvs_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cvs_server_packets" lineno="19137"> <summary> Relabel packets to cvs_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="19159"> <summary> Send and receive TCP traffic on the cyphesis port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_cyphesis_port" lineno="19178"> <summary> Send UDP traffic on the cyphesis port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="19197"> <summary> Do not audit attempts to send UDP traffic on the cyphesis port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_cyphesis_port" lineno="19216"> <summary> Receive UDP traffic on the cyphesis port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="19235"> <summary> Do not audit attempts to receive UDP traffic on the cyphesis port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_cyphesis_port" lineno="19254"> <summary> Send and receive UDP traffic on the cyphesis port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="19271"> <summary> Do not audit attempts to send and receive UDP traffic on the cyphesis port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_cyphesis_port" lineno="19287"> <summary> Bind TCP sockets to the cyphesis port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_cyphesis_port" lineno="19307"> <summary> Bind UDP sockets to the cyphesis port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_cyphesis_port" lineno="19326"> <summary> Make a TCP connection to the cyphesis port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cyphesis_client_packets" lineno="19346"> <summary> Send cyphesis_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="19365"> <summary> Do not audit attempts to send cyphesis_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cyphesis_client_packets" lineno="19384"> <summary> Receive cyphesis_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="19403"> <summary> Do not audit attempts to receive cyphesis_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cyphesis_client_packets" lineno="19422"> <summary> Send and receive cyphesis_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="19438"> <summary> Do not audit attempts to send and receive cyphesis_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cyphesis_client_packets" lineno="19453"> <summary> Relabel packets to cyphesis_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_cyphesis_server_packets" lineno="19473"> <summary> Send cyphesis_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="19492"> <summary> Do not audit attempts to send cyphesis_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_cyphesis_server_packets" lineno="19511"> <summary> Receive cyphesis_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="19530"> <summary> Do not audit attempts to receive cyphesis_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_cyphesis_server_packets" lineno="19549"> <summary> Send and receive cyphesis_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="19565"> <summary> Do not audit attempts to send and receive cyphesis_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_cyphesis_server_packets" lineno="19580"> <summary> Relabel packets to cyphesis_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_connlcli_port" lineno="19602"> <summary> Send and receive TCP traffic on the connlcli port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_connlcli_port" lineno="19621"> <summary> Send UDP traffic on the connlcli port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_connlcli_port" lineno="19640"> <summary> Do not audit attempts to send UDP traffic on the connlcli port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_connlcli_port" lineno="19659"> <summary> Receive UDP traffic on the connlcli port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_connlcli_port" lineno="19678"> <summary> Do not audit attempts to receive UDP traffic on the connlcli port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_connlcli_port" lineno="19697"> <summary> Send and receive UDP traffic on the connlcli port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_connlcli_port" lineno="19714"> <summary> Do not audit attempts to send and receive UDP traffic on the connlcli port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_connlcli_port" lineno="19730"> <summary> Bind TCP sockets to the connlcli port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_connlcli_port" lineno="19750"> <summary> Bind UDP sockets to the connlcli port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_connlcli_port" lineno="19769"> <summary> Make a TCP connection to the connlcli port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_connlcli_client_packets" lineno="19789"> <summary> Send connlcli_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_connlcli_client_packets" lineno="19808"> <summary> Do not audit attempts to send connlcli_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_connlcli_client_packets" lineno="19827"> <summary> Receive connlcli_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_connlcli_client_packets" lineno="19846"> <summary> Do not audit attempts to receive connlcli_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_connlcli_client_packets" lineno="19865"> <summary> Send and receive connlcli_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_connlcli_client_packets" lineno="19881"> <summary> Do not audit attempts to send and receive connlcli_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_connlcli_client_packets" lineno="19896"> <summary> Relabel packets to connlcli_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_connlcli_server_packets" lineno="19916"> <summary> Send connlcli_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_connlcli_server_packets" lineno="19935"> <summary> Do not audit attempts to send connlcli_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_connlcli_server_packets" lineno="19954"> <summary> Receive connlcli_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_connlcli_server_packets" lineno="19973"> <summary> Do not audit attempts to receive connlcli_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_connlcli_server_packets" lineno="19992"> <summary> Send and receive connlcli_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_connlcli_server_packets" lineno="20008"> <summary> Do not audit attempts to send and receive connlcli_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_connlcli_server_packets" lineno="20023"> <summary> Relabel packets to connlcli_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_gluster_port" lineno="20045"> <summary> Send and receive TCP traffic on the gluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_gluster_port" lineno="20064"> <summary> Send UDP traffic on the gluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_gluster_port" lineno="20083"> <summary> Do not audit attempts to send UDP traffic on the gluster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_gluster_port" lineno="20102"> <summary> Receive UDP traffic on the gluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_gluster_port" lineno="20121"> <summary> Do not audit attempts to receive UDP traffic on the gluster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_gluster_port" lineno="20140"> <summary> Send and receive UDP traffic on the gluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_gluster_port" lineno="20157"> <summary> Do not audit attempts to send and receive UDP traffic on the gluster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_gluster_port" lineno="20173"> <summary> Bind TCP sockets to the gluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_gluster_port" lineno="20193"> <summary> Bind UDP sockets to the gluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_gluster_port" lineno="20212"> <summary> Make a TCP connection to the gluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_gluster_client_packets" lineno="20232"> <summary> Send gluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_gluster_client_packets" lineno="20251"> <summary> Do not audit attempts to send gluster_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_gluster_client_packets" lineno="20270"> <summary> Receive gluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_gluster_client_packets" lineno="20289"> <summary> Do not audit attempts to receive gluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_gluster_client_packets" lineno="20308"> <summary> Send and receive gluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_gluster_client_packets" lineno="20324"> <summary> Do not audit attempts to send and receive gluster_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_gluster_client_packets" lineno="20339"> <summary> Relabel packets to gluster_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_gluster_server_packets" lineno="20359"> <summary> Send gluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_gluster_server_packets" lineno="20378"> <summary> Do not audit attempts to send gluster_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_gluster_server_packets" lineno="20397"> <summary> Receive gluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_gluster_server_packets" lineno="20416"> <summary> Do not audit attempts to receive gluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_gluster_server_packets" lineno="20435"> <summary> Send and receive gluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_gluster_server_packets" lineno="20451"> <summary> Do not audit attempts to send and receive gluster_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_gluster_server_packets" lineno="20466"> <summary> Relabel packets to gluster_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="20488"> <summary> Send and receive TCP traffic on the dbskkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dbskkd_port" lineno="20507"> <summary> Send UDP traffic on the dbskkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="20526"> <summary> Do not audit attempts to send UDP traffic on the dbskkd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dbskkd_port" lineno="20545"> <summary> Receive UDP traffic on the dbskkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="20564"> <summary> Do not audit attempts to receive UDP traffic on the dbskkd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dbskkd_port" lineno="20583"> <summary> Send and receive UDP traffic on the dbskkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="20600"> <summary> Do not audit attempts to send and receive UDP traffic on the dbskkd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dbskkd_port" lineno="20616"> <summary> Bind TCP sockets to the dbskkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dbskkd_port" lineno="20636"> <summary> Bind UDP sockets to the dbskkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dbskkd_port" lineno="20655"> <summary> Make a TCP connection to the dbskkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dbskkd_client_packets" lineno="20675"> <summary> Send dbskkd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="20694"> <summary> Do not audit attempts to send dbskkd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dbskkd_client_packets" lineno="20713"> <summary> Receive dbskkd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="20732"> <summary> Do not audit attempts to receive dbskkd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dbskkd_client_packets" lineno="20751"> <summary> Send and receive dbskkd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="20767"> <summary> Do not audit attempts to send and receive dbskkd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dbskkd_client_packets" lineno="20782"> <summary> Relabel packets to dbskkd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dbskkd_server_packets" lineno="20802"> <summary> Send dbskkd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="20821"> <summary> Do not audit attempts to send dbskkd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dbskkd_server_packets" lineno="20840"> <summary> Receive dbskkd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="20859"> <summary> Do not audit attempts to receive dbskkd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dbskkd_server_packets" lineno="20878"> <summary> Send and receive dbskkd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="20894"> <summary> Do not audit attempts to send and receive dbskkd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dbskkd_server_packets" lineno="20909"> <summary> Relabel packets to dbskkd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dcc_port" lineno="20931"> <summary> Send and receive TCP traffic on the dcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dcc_port" lineno="20950"> <summary> Send UDP traffic on the dcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dcc_port" lineno="20969"> <summary> Do not audit attempts to send UDP traffic on the dcc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dcc_port" lineno="20988"> <summary> Receive UDP traffic on the dcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="21007"> <summary> Do not audit attempts to receive UDP traffic on the dcc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dcc_port" lineno="21026"> <summary> Send and receive UDP traffic on the dcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="21043"> <summary> Do not audit attempts to send and receive UDP traffic on the dcc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dcc_port" lineno="21059"> <summary> Bind TCP sockets to the dcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dcc_port" lineno="21079"> <summary> Bind UDP sockets to the dcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dcc_port" lineno="21098"> <summary> Make a TCP connection to the dcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dcc_client_packets" lineno="21118"> <summary> Send dcc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dcc_client_packets" lineno="21137"> <summary> Do not audit attempts to send dcc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dcc_client_packets" lineno="21156"> <summary> Receive dcc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="21175"> <summary> Do not audit attempts to receive dcc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dcc_client_packets" lineno="21194"> <summary> Send and receive dcc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="21210"> <summary> Do not audit attempts to send and receive dcc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dcc_client_packets" lineno="21225"> <summary> Relabel packets to dcc_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dcc_server_packets" lineno="21245"> <summary> Send dcc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dcc_server_packets" lineno="21264"> <summary> Do not audit attempts to send dcc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dcc_server_packets" lineno="21283"> <summary> Receive dcc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="21302"> <summary> Do not audit attempts to receive dcc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dcc_server_packets" lineno="21321"> <summary> Send and receive dcc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="21337"> <summary> Do not audit attempts to send and receive dcc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dcc_server_packets" lineno="21352"> <summary> Relabel packets to dcc_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dccm_port" lineno="21374"> <summary> Send and receive TCP traffic on the dccm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dccm_port" lineno="21393"> <summary> Send UDP traffic on the dccm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dccm_port" lineno="21412"> <summary> Do not audit attempts to send UDP traffic on the dccm port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dccm_port" lineno="21431"> <summary> Receive UDP traffic on the dccm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="21450"> <summary> Do not audit attempts to receive UDP traffic on the dccm port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dccm_port" lineno="21469"> <summary> Send and receive UDP traffic on the dccm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="21486"> <summary> Do not audit attempts to send and receive UDP traffic on the dccm port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dccm_port" lineno="21502"> <summary> Bind TCP sockets to the dccm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dccm_port" lineno="21522"> <summary> Bind UDP sockets to the dccm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dccm_port" lineno="21541"> <summary> Make a TCP connection to the dccm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dccm_client_packets" lineno="21561"> <summary> Send dccm_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dccm_client_packets" lineno="21580"> <summary> Do not audit attempts to send dccm_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dccm_client_packets" lineno="21599"> <summary> Receive dccm_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="21618"> <summary> Do not audit attempts to receive dccm_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dccm_client_packets" lineno="21637"> <summary> Send and receive dccm_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="21653"> <summary> Do not audit attempts to send and receive dccm_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dccm_client_packets" lineno="21668"> <summary> Relabel packets to dccm_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dccm_server_packets" lineno="21688"> <summary> Send dccm_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dccm_server_packets" lineno="21707"> <summary> Do not audit attempts to send dccm_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dccm_server_packets" lineno="21726"> <summary> Receive dccm_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="21745"> <summary> Do not audit attempts to receive dccm_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dccm_server_packets" lineno="21764"> <summary> Send and receive dccm_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="21780"> <summary> Do not audit attempts to send and receive dccm_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dccm_server_packets" lineno="21795"> <summary> Relabel packets to dccm_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="21817"> <summary> Send and receive TCP traffic on the dhcpc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dhcpc_port" lineno="21836"> <summary> Send UDP traffic on the dhcpc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="21855"> <summary> Do not audit attempts to send UDP traffic on the dhcpc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dhcpc_port" lineno="21874"> <summary> Receive UDP traffic on the dhcpc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="21893"> <summary> Do not audit attempts to receive UDP traffic on the dhcpc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dhcpc_port" lineno="21912"> <summary> Send and receive UDP traffic on the dhcpc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="21929"> <summary> Do not audit attempts to send and receive UDP traffic on the dhcpc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dhcpc_port" lineno="21945"> <summary> Bind TCP sockets to the dhcpc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dhcpc_port" lineno="21965"> <summary> Bind UDP sockets to the dhcpc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dhcpc_port" lineno="21984"> <summary> Make a TCP connection to the dhcpc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dhcpc_client_packets" lineno="22004"> <summary> Send dhcpc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="22023"> <summary> Do not audit attempts to send dhcpc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dhcpc_client_packets" lineno="22042"> <summary> Receive dhcpc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="22061"> <summary> Do not audit attempts to receive dhcpc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dhcpc_client_packets" lineno="22080"> <summary> Send and receive dhcpc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="22096"> <summary> Do not audit attempts to send and receive dhcpc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dhcpc_client_packets" lineno="22111"> <summary> Relabel packets to dhcpc_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dhcpc_server_packets" lineno="22131"> <summary> Send dhcpc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="22150"> <summary> Do not audit attempts to send dhcpc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dhcpc_server_packets" lineno="22169"> <summary> Receive dhcpc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="22188"> <summary> Do not audit attempts to receive dhcpc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dhcpc_server_packets" lineno="22207"> <summary> Send and receive dhcpc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="22223"> <summary> Do not audit attempts to send and receive dhcpc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dhcpc_server_packets" lineno="22238"> <summary> Relabel packets to dhcpc_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="22260"> <summary> Send and receive TCP traffic on the dhcpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dhcpd_port" lineno="22279"> <summary> Send UDP traffic on the dhcpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="22298"> <summary> Do not audit attempts to send UDP traffic on the dhcpd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dhcpd_port" lineno="22317"> <summary> Receive UDP traffic on the dhcpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="22336"> <summary> Do not audit attempts to receive UDP traffic on the dhcpd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dhcpd_port" lineno="22355"> <summary> Send and receive UDP traffic on the dhcpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="22372"> <summary> Do not audit attempts to send and receive UDP traffic on the dhcpd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dhcpd_port" lineno="22388"> <summary> Bind TCP sockets to the dhcpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dhcpd_port" lineno="22408"> <summary> Bind UDP sockets to the dhcpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dhcpd_port" lineno="22427"> <summary> Make a TCP connection to the dhcpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dhcpd_client_packets" lineno="22447"> <summary> Send dhcpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="22466"> <summary> Do not audit attempts to send dhcpd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dhcpd_client_packets" lineno="22485"> <summary> Receive dhcpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="22504"> <summary> Do not audit attempts to receive dhcpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dhcpd_client_packets" lineno="22523"> <summary> Send and receive dhcpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="22539"> <summary> Do not audit attempts to send and receive dhcpd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dhcpd_client_packets" lineno="22554"> <summary> Relabel packets to dhcpd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dhcpd_server_packets" lineno="22574"> <summary> Send dhcpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="22593"> <summary> Do not audit attempts to send dhcpd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dhcpd_server_packets" lineno="22612"> <summary> Receive dhcpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="22631"> <summary> Do not audit attempts to receive dhcpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dhcpd_server_packets" lineno="22650"> <summary> Send and receive dhcpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="22666"> <summary> Do not audit attempts to send and receive dhcpd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dhcpd_server_packets" lineno="22681"> <summary> Relabel packets to dhcpd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dey_sapi_port" lineno="22703"> <summary> Send and receive TCP traffic on the dey_sapi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dey_sapi_port" lineno="22722"> <summary> Send UDP traffic on the dey_sapi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dey_sapi_port" lineno="22741"> <summary> Do not audit attempts to send UDP traffic on the dey_sapi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dey_sapi_port" lineno="22760"> <summary> Receive UDP traffic on the dey_sapi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dey_sapi_port" lineno="22779"> <summary> Do not audit attempts to receive UDP traffic on the dey_sapi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dey_sapi_port" lineno="22798"> <summary> Send and receive UDP traffic on the dey_sapi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dey_sapi_port" lineno="22815"> <summary> Do not audit attempts to send and receive UDP traffic on the dey_sapi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dey_sapi_port" lineno="22831"> <summary> Bind TCP sockets to the dey_sapi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dey_sapi_port" lineno="22851"> <summary> Bind UDP sockets to the dey_sapi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dey_sapi_port" lineno="22870"> <summary> Make a TCP connection to the dey_sapi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dey_sapi_client_packets" lineno="22890"> <summary> Send dey_sapi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dey_sapi_client_packets" lineno="22909"> <summary> Do not audit attempts to send dey_sapi_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dey_sapi_client_packets" lineno="22928"> <summary> Receive dey_sapi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dey_sapi_client_packets" lineno="22947"> <summary> Do not audit attempts to receive dey_sapi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dey_sapi_client_packets" lineno="22966"> <summary> Send and receive dey_sapi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dey_sapi_client_packets" lineno="22982"> <summary> Do not audit attempts to send and receive dey_sapi_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dey_sapi_client_packets" lineno="22997"> <summary> Relabel packets to dey_sapi_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dey_sapi_server_packets" lineno="23017"> <summary> Send dey_sapi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dey_sapi_server_packets" lineno="23036"> <summary> Do not audit attempts to send dey_sapi_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dey_sapi_server_packets" lineno="23055"> <summary> Receive dey_sapi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dey_sapi_server_packets" lineno="23074"> <summary> Do not audit attempts to receive dey_sapi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dey_sapi_server_packets" lineno="23093"> <summary> Send and receive dey_sapi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dey_sapi_server_packets" lineno="23109"> <summary> Do not audit attempts to send and receive dey_sapi_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dey_sapi_server_packets" lineno="23124"> <summary> Relabel packets to dey_sapi_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dict_port" lineno="23146"> <summary> Send and receive TCP traffic on the dict port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dict_port" lineno="23165"> <summary> Send UDP traffic on the dict port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dict_port" lineno="23184"> <summary> Do not audit attempts to send UDP traffic on the dict port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dict_port" lineno="23203"> <summary> Receive UDP traffic on the dict port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dict_port" lineno="23222"> <summary> Do not audit attempts to receive UDP traffic on the dict port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dict_port" lineno="23241"> <summary> Send and receive UDP traffic on the dict port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="23258"> <summary> Do not audit attempts to send and receive UDP traffic on the dict port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dict_port" lineno="23274"> <summary> Bind TCP sockets to the dict port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dict_port" lineno="23294"> <summary> Bind UDP sockets to the dict port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dict_port" lineno="23313"> <summary> Make a TCP connection to the dict port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dict_client_packets" lineno="23333"> <summary> Send dict_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dict_client_packets" lineno="23352"> <summary> Do not audit attempts to send dict_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dict_client_packets" lineno="23371"> <summary> Receive dict_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dict_client_packets" lineno="23390"> <summary> Do not audit attempts to receive dict_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dict_client_packets" lineno="23409"> <summary> Send and receive dict_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="23425"> <summary> Do not audit attempts to send and receive dict_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dict_client_packets" lineno="23440"> <summary> Relabel packets to dict_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dict_server_packets" lineno="23460"> <summary> Send dict_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dict_server_packets" lineno="23479"> <summary> Do not audit attempts to send dict_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dict_server_packets" lineno="23498"> <summary> Receive dict_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dict_server_packets" lineno="23517"> <summary> Do not audit attempts to receive dict_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dict_server_packets" lineno="23536"> <summary> Send and receive dict_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="23552"> <summary> Do not audit attempts to send and receive dict_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dict_server_packets" lineno="23567"> <summary> Relabel packets to dict_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_distccd_port" lineno="23589"> <summary> Send and receive TCP traffic on the distccd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_distccd_port" lineno="23608"> <summary> Send UDP traffic on the distccd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_distccd_port" lineno="23627"> <summary> Do not audit attempts to send UDP traffic on the distccd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_distccd_port" lineno="23646"> <summary> Receive UDP traffic on the distccd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="23665"> <summary> Do not audit attempts to receive UDP traffic on the distccd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_distccd_port" lineno="23684"> <summary> Send and receive UDP traffic on the distccd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="23701"> <summary> Do not audit attempts to send and receive UDP traffic on the distccd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_distccd_port" lineno="23717"> <summary> Bind TCP sockets to the distccd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_distccd_port" lineno="23737"> <summary> Bind UDP sockets to the distccd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_distccd_port" lineno="23756"> <summary> Make a TCP connection to the distccd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_distccd_client_packets" lineno="23776"> <summary> Send distccd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_distccd_client_packets" lineno="23795"> <summary> Do not audit attempts to send distccd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_distccd_client_packets" lineno="23814"> <summary> Receive distccd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="23833"> <summary> Do not audit attempts to receive distccd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_distccd_client_packets" lineno="23852"> <summary> Send and receive distccd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="23868"> <summary> Do not audit attempts to send and receive distccd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_distccd_client_packets" lineno="23883"> <summary> Relabel packets to distccd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_distccd_server_packets" lineno="23903"> <summary> Send distccd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_distccd_server_packets" lineno="23922"> <summary> Do not audit attempts to send distccd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_distccd_server_packets" lineno="23941"> <summary> Receive distccd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="23960"> <summary> Do not audit attempts to receive distccd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_distccd_server_packets" lineno="23979"> <summary> Send and receive distccd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="23995"> <summary> Do not audit attempts to send and receive distccd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_distccd_server_packets" lineno="24010"> <summary> Relabel packets to distccd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dns_port" lineno="24032"> <summary> Send and receive TCP traffic on the dns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dns_port" lineno="24051"> <summary> Send UDP traffic on the dns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dns_port" lineno="24070"> <summary> Do not audit attempts to send UDP traffic on the dns port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dns_port" lineno="24089"> <summary> Receive UDP traffic on the dns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dns_port" lineno="24108"> <summary> Do not audit attempts to receive UDP traffic on the dns port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dns_port" lineno="24127"> <summary> Send and receive UDP traffic on the dns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="24144"> <summary> Do not audit attempts to send and receive UDP traffic on the dns port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dns_port" lineno="24160"> <summary> Bind TCP sockets to the dns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dns_port" lineno="24180"> <summary> Bind UDP sockets to the dns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dns_port" lineno="24199"> <summary> Make a TCP connection to the dns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dns_client_packets" lineno="24219"> <summary> Send dns_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dns_client_packets" lineno="24238"> <summary> Do not audit attempts to send dns_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dns_client_packets" lineno="24257"> <summary> Receive dns_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dns_client_packets" lineno="24276"> <summary> Do not audit attempts to receive dns_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dns_client_packets" lineno="24295"> <summary> Send and receive dns_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="24311"> <summary> Do not audit attempts to send and receive dns_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dns_client_packets" lineno="24326"> <summary> Relabel packets to dns_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dns_server_packets" lineno="24346"> <summary> Send dns_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dns_server_packets" lineno="24365"> <summary> Do not audit attempts to send dns_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dns_server_packets" lineno="24384"> <summary> Receive dns_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dns_server_packets" lineno="24403"> <summary> Do not audit attempts to receive dns_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dns_server_packets" lineno="24422"> <summary> Send and receive dns_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="24438"> <summary> Do not audit attempts to send and receive dns_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dns_server_packets" lineno="24453"> <summary> Relabel packets to dns_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dogtag_port" lineno="24475"> <summary> Send and receive TCP traffic on the dogtag port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dogtag_port" lineno="24494"> <summary> Send UDP traffic on the dogtag port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dogtag_port" lineno="24513"> <summary> Do not audit attempts to send UDP traffic on the dogtag port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dogtag_port" lineno="24532"> <summary> Receive UDP traffic on the dogtag port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dogtag_port" lineno="24551"> <summary> Do not audit attempts to receive UDP traffic on the dogtag port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dogtag_port" lineno="24570"> <summary> Send and receive UDP traffic on the dogtag port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dogtag_port" lineno="24587"> <summary> Do not audit attempts to send and receive UDP traffic on the dogtag port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dogtag_port" lineno="24603"> <summary> Bind TCP sockets to the dogtag port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dogtag_port" lineno="24623"> <summary> Bind UDP sockets to the dogtag port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dogtag_port" lineno="24642"> <summary> Make a TCP connection to the dogtag port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dogtag_client_packets" lineno="24662"> <summary> Send dogtag_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dogtag_client_packets" lineno="24681"> <summary> Do not audit attempts to send dogtag_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dogtag_client_packets" lineno="24700"> <summary> Receive dogtag_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dogtag_client_packets" lineno="24719"> <summary> Do not audit attempts to receive dogtag_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dogtag_client_packets" lineno="24738"> <summary> Send and receive dogtag_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dogtag_client_packets" lineno="24754"> <summary> Do not audit attempts to send and receive dogtag_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dogtag_client_packets" lineno="24769"> <summary> Relabel packets to dogtag_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dogtag_server_packets" lineno="24789"> <summary> Send dogtag_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dogtag_server_packets" lineno="24808"> <summary> Do not audit attempts to send dogtag_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dogtag_server_packets" lineno="24827"> <summary> Receive dogtag_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dogtag_server_packets" lineno="24846"> <summary> Do not audit attempts to receive dogtag_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dogtag_server_packets" lineno="24865"> <summary> Send and receive dogtag_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dogtag_server_packets" lineno="24881"> <summary> Do not audit attempts to send and receive dogtag_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dogtag_server_packets" lineno="24896"> <summary> Relabel packets to dogtag_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_dspam_port" lineno="24918"> <summary> Send and receive TCP traffic on the dspam port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_dspam_port" lineno="24937"> <summary> Send UDP traffic on the dspam port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_dspam_port" lineno="24956"> <summary> Do not audit attempts to send UDP traffic on the dspam port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_dspam_port" lineno="24975"> <summary> Receive UDP traffic on the dspam port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_dspam_port" lineno="24994"> <summary> Do not audit attempts to receive UDP traffic on the dspam port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_dspam_port" lineno="25013"> <summary> Send and receive UDP traffic on the dspam port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_dspam_port" lineno="25030"> <summary> Do not audit attempts to send and receive UDP traffic on the dspam port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_dspam_port" lineno="25046"> <summary> Bind TCP sockets to the dspam port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_dspam_port" lineno="25066"> <summary> Bind UDP sockets to the dspam port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_dspam_port" lineno="25085"> <summary> Make a TCP connection to the dspam port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dspam_client_packets" lineno="25105"> <summary> Send dspam_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dspam_client_packets" lineno="25124"> <summary> Do not audit attempts to send dspam_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dspam_client_packets" lineno="25143"> <summary> Receive dspam_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dspam_client_packets" lineno="25162"> <summary> Do not audit attempts to receive dspam_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dspam_client_packets" lineno="25181"> <summary> Send and receive dspam_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dspam_client_packets" lineno="25197"> <summary> Do not audit attempts to send and receive dspam_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dspam_client_packets" lineno="25212"> <summary> Relabel packets to dspam_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_dspam_server_packets" lineno="25232"> <summary> Send dspam_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_dspam_server_packets" lineno="25251"> <summary> Do not audit attempts to send dspam_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_dspam_server_packets" lineno="25270"> <summary> Receive dspam_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_dspam_server_packets" lineno="25289"> <summary> Do not audit attempts to receive dspam_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_dspam_server_packets" lineno="25308"> <summary> Send and receive dspam_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_dspam_server_packets" lineno="25324"> <summary> Do not audit attempts to send and receive dspam_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_dspam_server_packets" lineno="25339"> <summary> Relabel packets to dspam_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_epmap_port" lineno="25361"> <summary> Send and receive TCP traffic on the epmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_epmap_port" lineno="25380"> <summary> Send UDP traffic on the epmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_epmap_port" lineno="25399"> <summary> Do not audit attempts to send UDP traffic on the epmap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_epmap_port" lineno="25418"> <summary> Receive UDP traffic on the epmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="25437"> <summary> Do not audit attempts to receive UDP traffic on the epmap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_epmap_port" lineno="25456"> <summary> Send and receive UDP traffic on the epmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="25473"> <summary> Do not audit attempts to send and receive UDP traffic on the epmap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_epmap_port" lineno="25489"> <summary> Bind TCP sockets to the epmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_epmap_port" lineno="25509"> <summary> Bind UDP sockets to the epmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_epmap_port" lineno="25528"> <summary> Make a TCP connection to the epmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_epmap_client_packets" lineno="25548"> <summary> Send epmap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_epmap_client_packets" lineno="25567"> <summary> Do not audit attempts to send epmap_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_epmap_client_packets" lineno="25586"> <summary> Receive epmap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="25605"> <summary> Do not audit attempts to receive epmap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_epmap_client_packets" lineno="25624"> <summary> Send and receive epmap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="25640"> <summary> Do not audit attempts to send and receive epmap_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_epmap_client_packets" lineno="25655"> <summary> Relabel packets to epmap_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_epmap_server_packets" lineno="25675"> <summary> Send epmap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_epmap_server_packets" lineno="25694"> <summary> Do not audit attempts to send epmap_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_epmap_server_packets" lineno="25713"> <summary> Receive epmap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="25732"> <summary> Do not audit attempts to receive epmap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_epmap_server_packets" lineno="25751"> <summary> Send and receive epmap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="25767"> <summary> Do not audit attempts to send and receive epmap_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_epmap_server_packets" lineno="25782"> <summary> Relabel packets to epmap_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_festival_port" lineno="25804"> <summary> Send and receive TCP traffic on the festival port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_festival_port" lineno="25823"> <summary> Send UDP traffic on the festival port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_festival_port" lineno="25842"> <summary> Do not audit attempts to send UDP traffic on the festival port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_festival_port" lineno="25861"> <summary> Receive UDP traffic on the festival port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_festival_port" lineno="25880"> <summary> Do not audit attempts to receive UDP traffic on the festival port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_festival_port" lineno="25899"> <summary> Send and receive UDP traffic on the festival port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_festival_port" lineno="25916"> <summary> Do not audit attempts to send and receive UDP traffic on the festival port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_festival_port" lineno="25932"> <summary> Bind TCP sockets to the festival port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_festival_port" lineno="25952"> <summary> Bind UDP sockets to the festival port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_festival_port" lineno="25971"> <summary> Make a TCP connection to the festival port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_festival_client_packets" lineno="25991"> <summary> Send festival_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_festival_client_packets" lineno="26010"> <summary> Do not audit attempts to send festival_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_festival_client_packets" lineno="26029"> <summary> Receive festival_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_festival_client_packets" lineno="26048"> <summary> Do not audit attempts to receive festival_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_festival_client_packets" lineno="26067"> <summary> Send and receive festival_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_festival_client_packets" lineno="26083"> <summary> Do not audit attempts to send and receive festival_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_festival_client_packets" lineno="26098"> <summary> Relabel packets to festival_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_festival_server_packets" lineno="26118"> <summary> Send festival_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_festival_server_packets" lineno="26137"> <summary> Do not audit attempts to send festival_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_festival_server_packets" lineno="26156"> <summary> Receive festival_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_festival_server_packets" lineno="26175"> <summary> Do not audit attempts to receive festival_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_festival_server_packets" lineno="26194"> <summary> Send and receive festival_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_festival_server_packets" lineno="26210"> <summary> Do not audit attempts to send and receive festival_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_festival_server_packets" lineno="26225"> <summary> Relabel packets to festival_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_fingerd_port" lineno="26247"> <summary> Send and receive TCP traffic on the fingerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_fingerd_port" lineno="26266"> <summary> Send UDP traffic on the fingerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="26285"> <summary> Do not audit attempts to send UDP traffic on the fingerd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_fingerd_port" lineno="26304"> <summary> Receive UDP traffic on the fingerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="26323"> <summary> Do not audit attempts to receive UDP traffic on the fingerd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_fingerd_port" lineno="26342"> <summary> Send and receive UDP traffic on the fingerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="26359"> <summary> Do not audit attempts to send and receive UDP traffic on the fingerd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_fingerd_port" lineno="26375"> <summary> Bind TCP sockets to the fingerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_fingerd_port" lineno="26395"> <summary> Bind UDP sockets to the fingerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_fingerd_port" lineno="26414"> <summary> Make a TCP connection to the fingerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_fingerd_client_packets" lineno="26434"> <summary> Send fingerd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="26453"> <summary> Do not audit attempts to send fingerd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_fingerd_client_packets" lineno="26472"> <summary> Receive fingerd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="26491"> <summary> Do not audit attempts to receive fingerd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_fingerd_client_packets" lineno="26510"> <summary> Send and receive fingerd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="26526"> <summary> Do not audit attempts to send and receive fingerd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_fingerd_client_packets" lineno="26541"> <summary> Relabel packets to fingerd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_fingerd_server_packets" lineno="26561"> <summary> Send fingerd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="26580"> <summary> Do not audit attempts to send fingerd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_fingerd_server_packets" lineno="26599"> <summary> Receive fingerd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="26618"> <summary> Do not audit attempts to receive fingerd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_fingerd_server_packets" lineno="26637"> <summary> Send and receive fingerd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="26653"> <summary> Do not audit attempts to send and receive fingerd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_fingerd_server_packets" lineno="26668"> <summary> Relabel packets to fingerd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_flash_port" lineno="26690"> <summary> Send and receive TCP traffic on the flash port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_flash_port" lineno="26709"> <summary> Send UDP traffic on the flash port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_flash_port" lineno="26728"> <summary> Do not audit attempts to send UDP traffic on the flash port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_flash_port" lineno="26747"> <summary> Receive UDP traffic on the flash port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_flash_port" lineno="26766"> <summary> Do not audit attempts to receive UDP traffic on the flash port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_flash_port" lineno="26785"> <summary> Send and receive UDP traffic on the flash port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_flash_port" lineno="26802"> <summary> Do not audit attempts to send and receive UDP traffic on the flash port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_flash_port" lineno="26818"> <summary> Bind TCP sockets to the flash port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_flash_port" lineno="26838"> <summary> Bind UDP sockets to the flash port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_flash_port" lineno="26857"> <summary> Make a TCP connection to the flash port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_flash_client_packets" lineno="26877"> <summary> Send flash_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_flash_client_packets" lineno="26896"> <summary> Do not audit attempts to send flash_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_flash_client_packets" lineno="26915"> <summary> Receive flash_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_flash_client_packets" lineno="26934"> <summary> Do not audit attempts to receive flash_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_flash_client_packets" lineno="26953"> <summary> Send and receive flash_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_flash_client_packets" lineno="26969"> <summary> Do not audit attempts to send and receive flash_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_flash_client_packets" lineno="26984"> <summary> Relabel packets to flash_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_flash_server_packets" lineno="27004"> <summary> Send flash_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_flash_server_packets" lineno="27023"> <summary> Do not audit attempts to send flash_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_flash_server_packets" lineno="27042"> <summary> Receive flash_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_flash_server_packets" lineno="27061"> <summary> Do not audit attempts to receive flash_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_flash_server_packets" lineno="27080"> <summary> Send and receive flash_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_flash_server_packets" lineno="27096"> <summary> Do not audit attempts to send and receive flash_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_flash_server_packets" lineno="27111"> <summary> Relabel packets to flash_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_florence_port" lineno="27133"> <summary> Send and receive TCP traffic on the florence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_florence_port" lineno="27152"> <summary> Send UDP traffic on the florence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_florence_port" lineno="27171"> <summary> Do not audit attempts to send UDP traffic on the florence port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_florence_port" lineno="27190"> <summary> Receive UDP traffic on the florence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_florence_port" lineno="27209"> <summary> Do not audit attempts to receive UDP traffic on the florence port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_florence_port" lineno="27228"> <summary> Send and receive UDP traffic on the florence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_florence_port" lineno="27245"> <summary> Do not audit attempts to send and receive UDP traffic on the florence port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_florence_port" lineno="27261"> <summary> Bind TCP sockets to the florence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_florence_port" lineno="27281"> <summary> Bind UDP sockets to the florence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_florence_port" lineno="27300"> <summary> Make a TCP connection to the florence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_florence_client_packets" lineno="27320"> <summary> Send florence_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_florence_client_packets" lineno="27339"> <summary> Do not audit attempts to send florence_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_florence_client_packets" lineno="27358"> <summary> Receive florence_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_florence_client_packets" lineno="27377"> <summary> Do not audit attempts to receive florence_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_florence_client_packets" lineno="27396"> <summary> Send and receive florence_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_florence_client_packets" lineno="27412"> <summary> Do not audit attempts to send and receive florence_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_florence_client_packets" lineno="27427"> <summary> Relabel packets to florence_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_florence_server_packets" lineno="27447"> <summary> Send florence_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_florence_server_packets" lineno="27466"> <summary> Do not audit attempts to send florence_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_florence_server_packets" lineno="27485"> <summary> Receive florence_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_florence_server_packets" lineno="27504"> <summary> Do not audit attempts to receive florence_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_florence_server_packets" lineno="27523"> <summary> Send and receive florence_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_florence_server_packets" lineno="27539"> <summary> Do not audit attempts to send and receive florence_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_florence_server_packets" lineno="27554"> <summary> Relabel packets to florence_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_freeipmi_port" lineno="27576"> <summary> Send and receive TCP traffic on the freeipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_freeipmi_port" lineno="27595"> <summary> Send UDP traffic on the freeipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_freeipmi_port" lineno="27614"> <summary> Do not audit attempts to send UDP traffic on the freeipmi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_freeipmi_port" lineno="27633"> <summary> Receive UDP traffic on the freeipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_freeipmi_port" lineno="27652"> <summary> Do not audit attempts to receive UDP traffic on the freeipmi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_freeipmi_port" lineno="27671"> <summary> Send and receive UDP traffic on the freeipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_freeipmi_port" lineno="27688"> <summary> Do not audit attempts to send and receive UDP traffic on the freeipmi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_freeipmi_port" lineno="27704"> <summary> Bind TCP sockets to the freeipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_freeipmi_port" lineno="27724"> <summary> Bind UDP sockets to the freeipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_freeipmi_port" lineno="27743"> <summary> Make a TCP connection to the freeipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_freeipmi_client_packets" lineno="27763"> <summary> Send freeipmi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_freeipmi_client_packets" lineno="27782"> <summary> Do not audit attempts to send freeipmi_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_freeipmi_client_packets" lineno="27801"> <summary> Receive freeipmi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_freeipmi_client_packets" lineno="27820"> <summary> Do not audit attempts to receive freeipmi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_freeipmi_client_packets" lineno="27839"> <summary> Send and receive freeipmi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_freeipmi_client_packets" lineno="27855"> <summary> Do not audit attempts to send and receive freeipmi_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_freeipmi_client_packets" lineno="27870"> <summary> Relabel packets to freeipmi_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_freeipmi_server_packets" lineno="27890"> <summary> Send freeipmi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_freeipmi_server_packets" lineno="27909"> <summary> Do not audit attempts to send freeipmi_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_freeipmi_server_packets" lineno="27928"> <summary> Receive freeipmi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_freeipmi_server_packets" lineno="27947"> <summary> Do not audit attempts to receive freeipmi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_freeipmi_server_packets" lineno="27966"> <summary> Send and receive freeipmi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_freeipmi_server_packets" lineno="27982"> <summary> Do not audit attempts to send and receive freeipmi_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_freeipmi_server_packets" lineno="27997"> <summary> Relabel packets to freeipmi_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ftp_port" lineno="28019"> <summary> Send and receive TCP traffic on the ftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ftp_port" lineno="28038"> <summary> Send UDP traffic on the ftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ftp_port" lineno="28057"> <summary> Do not audit attempts to send UDP traffic on the ftp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ftp_port" lineno="28076"> <summary> Receive UDP traffic on the ftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="28095"> <summary> Do not audit attempts to receive UDP traffic on the ftp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ftp_port" lineno="28114"> <summary> Send and receive UDP traffic on the ftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="28131"> <summary> Do not audit attempts to send and receive UDP traffic on the ftp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ftp_port" lineno="28147"> <summary> Bind TCP sockets to the ftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ftp_port" lineno="28167"> <summary> Bind UDP sockets to the ftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ftp_port" lineno="28186"> <summary> Make a TCP connection to the ftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ftp_client_packets" lineno="28206"> <summary> Send ftp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ftp_client_packets" lineno="28225"> <summary> Do not audit attempts to send ftp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ftp_client_packets" lineno="28244"> <summary> Receive ftp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="28263"> <summary> Do not audit attempts to receive ftp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ftp_client_packets" lineno="28282"> <summary> Send and receive ftp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="28298"> <summary> Do not audit attempts to send and receive ftp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ftp_client_packets" lineno="28313"> <summary> Relabel packets to ftp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ftp_server_packets" lineno="28333"> <summary> Send ftp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ftp_server_packets" lineno="28352"> <summary> Do not audit attempts to send ftp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ftp_server_packets" lineno="28371"> <summary> Receive ftp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="28390"> <summary> Do not audit attempts to receive ftp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ftp_server_packets" lineno="28409"> <summary> Send and receive ftp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="28425"> <summary> Do not audit attempts to send and receive ftp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ftp_server_packets" lineno="28440"> <summary> Relabel packets to ftp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="28462"> <summary> Send and receive TCP traffic on the ftp_data port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ftp_data_port" lineno="28481"> <summary> Send UDP traffic on the ftp_data port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="28500"> <summary> Do not audit attempts to send UDP traffic on the ftp_data port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ftp_data_port" lineno="28519"> <summary> Receive UDP traffic on the ftp_data port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="28538"> <summary> Do not audit attempts to receive UDP traffic on the ftp_data port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ftp_data_port" lineno="28557"> <summary> Send and receive UDP traffic on the ftp_data port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="28574"> <summary> Do not audit attempts to send and receive UDP traffic on the ftp_data port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ftp_data_port" lineno="28590"> <summary> Bind TCP sockets to the ftp_data port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ftp_data_port" lineno="28610"> <summary> Bind UDP sockets to the ftp_data port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ftp_data_port" lineno="28629"> <summary> Make a TCP connection to the ftp_data port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ftp_data_client_packets" lineno="28649"> <summary> Send ftp_data_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="28668"> <summary> Do not audit attempts to send ftp_data_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ftp_data_client_packets" lineno="28687"> <summary> Receive ftp_data_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="28706"> <summary> Do not audit attempts to receive ftp_data_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ftp_data_client_packets" lineno="28725"> <summary> Send and receive ftp_data_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="28741"> <summary> Do not audit attempts to send and receive ftp_data_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ftp_data_client_packets" lineno="28756"> <summary> Relabel packets to ftp_data_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ftp_data_server_packets" lineno="28776"> <summary> Send ftp_data_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="28795"> <summary> Do not audit attempts to send ftp_data_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ftp_data_server_packets" lineno="28814"> <summary> Receive ftp_data_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="28833"> <summary> Do not audit attempts to receive ftp_data_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ftp_data_server_packets" lineno="28852"> <summary> Send and receive ftp_data_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="28868"> <summary> Do not audit attempts to send and receive ftp_data_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ftp_data_server_packets" lineno="28883"> <summary> Relabel packets to ftp_data_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="28905"> <summary> Send and receive TCP traffic on the gatekeeper port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_gatekeeper_port" lineno="28924"> <summary> Send UDP traffic on the gatekeeper port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="28943"> <summary> Do not audit attempts to send UDP traffic on the gatekeeper port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_gatekeeper_port" lineno="28962"> <summary> Receive UDP traffic on the gatekeeper port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="28981"> <summary> Do not audit attempts to receive UDP traffic on the gatekeeper port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="29000"> <summary> Send and receive UDP traffic on the gatekeeper port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="29017"> <summary> Do not audit attempts to send and receive UDP traffic on the gatekeeper port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_gatekeeper_port" lineno="29033"> <summary> Bind TCP sockets to the gatekeeper port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_gatekeeper_port" lineno="29053"> <summary> Bind UDP sockets to the gatekeeper port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_gatekeeper_port" lineno="29072"> <summary> Make a TCP connection to the gatekeeper port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_gatekeeper_client_packets" lineno="29092"> <summary> Send gatekeeper_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="29111"> <summary> Do not audit attempts to send gatekeeper_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_gatekeeper_client_packets" lineno="29130"> <summary> Receive gatekeeper_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="29149"> <summary> Do not audit attempts to receive gatekeeper_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="29168"> <summary> Send and receive gatekeeper_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="29184"> <summary> Do not audit attempts to send and receive gatekeeper_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_gatekeeper_client_packets" lineno="29199"> <summary> Relabel packets to gatekeeper_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_gatekeeper_server_packets" lineno="29219"> <summary> Send gatekeeper_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="29238"> <summary> Do not audit attempts to send gatekeeper_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_gatekeeper_server_packets" lineno="29257"> <summary> Receive gatekeeper_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="29276"> <summary> Do not audit attempts to receive gatekeeper_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="29295"> <summary> Send and receive gatekeeper_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="29311"> <summary> Do not audit attempts to send and receive gatekeeper_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_gatekeeper_server_packets" lineno="29326"> <summary> Relabel packets to gatekeeper_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_giftd_port" lineno="29348"> <summary> Send and receive TCP traffic on the giftd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_giftd_port" lineno="29367"> <summary> Send UDP traffic on the giftd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_giftd_port" lineno="29386"> <summary> Do not audit attempts to send UDP traffic on the giftd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_giftd_port" lineno="29405"> <summary> Receive UDP traffic on the giftd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="29424"> <summary> Do not audit attempts to receive UDP traffic on the giftd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_giftd_port" lineno="29443"> <summary> Send and receive UDP traffic on the giftd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="29460"> <summary> Do not audit attempts to send and receive UDP traffic on the giftd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_giftd_port" lineno="29476"> <summary> Bind TCP sockets to the giftd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_giftd_port" lineno="29496"> <summary> Bind UDP sockets to the giftd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_giftd_port" lineno="29515"> <summary> Make a TCP connection to the giftd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_giftd_client_packets" lineno="29535"> <summary> Send giftd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_giftd_client_packets" lineno="29554"> <summary> Do not audit attempts to send giftd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_giftd_client_packets" lineno="29573"> <summary> Receive giftd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="29592"> <summary> Do not audit attempts to receive giftd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_giftd_client_packets" lineno="29611"> <summary> Send and receive giftd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="29627"> <summary> Do not audit attempts to send and receive giftd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_giftd_client_packets" lineno="29642"> <summary> Relabel packets to giftd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_giftd_server_packets" lineno="29662"> <summary> Send giftd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_giftd_server_packets" lineno="29681"> <summary> Do not audit attempts to send giftd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_giftd_server_packets" lineno="29700"> <summary> Receive giftd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="29719"> <summary> Do not audit attempts to receive giftd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_giftd_server_packets" lineno="29738"> <summary> Send and receive giftd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="29754"> <summary> Do not audit attempts to send and receive giftd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_giftd_server_packets" lineno="29769"> <summary> Relabel packets to giftd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_git_port" lineno="29791"> <summary> Send and receive TCP traffic on the git port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_git_port" lineno="29810"> <summary> Send UDP traffic on the git port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_git_port" lineno="29829"> <summary> Do not audit attempts to send UDP traffic on the git port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_git_port" lineno="29848"> <summary> Receive UDP traffic on the git port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_git_port" lineno="29867"> <summary> Do not audit attempts to receive UDP traffic on the git port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_git_port" lineno="29886"> <summary> Send and receive UDP traffic on the git port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="29903"> <summary> Do not audit attempts to send and receive UDP traffic on the git port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_git_port" lineno="29919"> <summary> Bind TCP sockets to the git port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_git_port" lineno="29939"> <summary> Bind UDP sockets to the git port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_git_port" lineno="29958"> <summary> Make a TCP connection to the git port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_git_client_packets" lineno="29978"> <summary> Send git_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_git_client_packets" lineno="29997"> <summary> Do not audit attempts to send git_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_git_client_packets" lineno="30016"> <summary> Receive git_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_git_client_packets" lineno="30035"> <summary> Do not audit attempts to receive git_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_git_client_packets" lineno="30054"> <summary> Send and receive git_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="30070"> <summary> Do not audit attempts to send and receive git_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_git_client_packets" lineno="30085"> <summary> Relabel packets to git_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_git_server_packets" lineno="30105"> <summary> Send git_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_git_server_packets" lineno="30124"> <summary> Do not audit attempts to send git_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_git_server_packets" lineno="30143"> <summary> Receive git_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_git_server_packets" lineno="30162"> <summary> Do not audit attempts to receive git_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_git_server_packets" lineno="30181"> <summary> Send and receive git_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="30197"> <summary> Do not audit attempts to send and receive git_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_git_server_packets" lineno="30212"> <summary> Relabel packets to git_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_glance_port" lineno="30234"> <summary> Send and receive TCP traffic on the glance port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_glance_port" lineno="30253"> <summary> Send UDP traffic on the glance port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_glance_port" lineno="30272"> <summary> Do not audit attempts to send UDP traffic on the glance port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_glance_port" lineno="30291"> <summary> Receive UDP traffic on the glance port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_glance_port" lineno="30310"> <summary> Do not audit attempts to receive UDP traffic on the glance port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_glance_port" lineno="30329"> <summary> Send and receive UDP traffic on the glance port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_glance_port" lineno="30346"> <summary> Do not audit attempts to send and receive UDP traffic on the glance port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_glance_port" lineno="30362"> <summary> Bind TCP sockets to the glance port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_glance_port" lineno="30382"> <summary> Bind UDP sockets to the glance port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_glance_port" lineno="30401"> <summary> Make a TCP connection to the glance port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_glance_client_packets" lineno="30421"> <summary> Send glance_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_glance_client_packets" lineno="30440"> <summary> Do not audit attempts to send glance_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_glance_client_packets" lineno="30459"> <summary> Receive glance_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_glance_client_packets" lineno="30478"> <summary> Do not audit attempts to receive glance_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_glance_client_packets" lineno="30497"> <summary> Send and receive glance_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_glance_client_packets" lineno="30513"> <summary> Do not audit attempts to send and receive glance_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_glance_client_packets" lineno="30528"> <summary> Relabel packets to glance_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_glance_server_packets" lineno="30548"> <summary> Send glance_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_glance_server_packets" lineno="30567"> <summary> Do not audit attempts to send glance_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_glance_server_packets" lineno="30586"> <summary> Receive glance_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_glance_server_packets" lineno="30605"> <summary> Do not audit attempts to receive glance_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_glance_server_packets" lineno="30624"> <summary> Send and receive glance_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_glance_server_packets" lineno="30640"> <summary> Do not audit attempts to send and receive glance_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_glance_server_packets" lineno="30655"> <summary> Relabel packets to glance_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="30677"> <summary> Send and receive TCP traffic on the glance_registry port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_glance_registry_port" lineno="30696"> <summary> Send UDP traffic on the glance_registry port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="30715"> <summary> Do not audit attempts to send UDP traffic on the glance_registry port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_glance_registry_port" lineno="30734"> <summary> Receive UDP traffic on the glance_registry port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="30753"> <summary> Do not audit attempts to receive UDP traffic on the glance_registry port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_glance_registry_port" lineno="30772"> <summary> Send and receive UDP traffic on the glance_registry port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="30789"> <summary> Do not audit attempts to send and receive UDP traffic on the glance_registry port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_glance_registry_port" lineno="30805"> <summary> Bind TCP sockets to the glance_registry port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_glance_registry_port" lineno="30825"> <summary> Bind UDP sockets to the glance_registry port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_glance_registry_port" lineno="30844"> <summary> Make a TCP connection to the glance_registry port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_glance_registry_client_packets" lineno="30864"> <summary> Send glance_registry_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="30883"> <summary> Do not audit attempts to send glance_registry_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_glance_registry_client_packets" lineno="30902"> <summary> Receive glance_registry_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="30921"> <summary> Do not audit attempts to receive glance_registry_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_glance_registry_client_packets" lineno="30940"> <summary> Send and receive glance_registry_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="30956"> <summary> Do not audit attempts to send and receive glance_registry_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_glance_registry_client_packets" lineno="30971"> <summary> Relabel packets to glance_registry_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_glance_registry_server_packets" lineno="30991"> <summary> Send glance_registry_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="31010"> <summary> Do not audit attempts to send glance_registry_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_glance_registry_server_packets" lineno="31029"> <summary> Receive glance_registry_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="31048"> <summary> Do not audit attempts to receive glance_registry_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_glance_registry_server_packets" lineno="31067"> <summary> Send and receive glance_registry_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="31083"> <summary> Do not audit attempts to send and receive glance_registry_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_glance_registry_server_packets" lineno="31098"> <summary> Relabel packets to glance_registry_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_gopher_port" lineno="31120"> <summary> Send and receive TCP traffic on the gopher port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_gopher_port" lineno="31139"> <summary> Send UDP traffic on the gopher port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_gopher_port" lineno="31158"> <summary> Do not audit attempts to send UDP traffic on the gopher port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_gopher_port" lineno="31177"> <summary> Receive UDP traffic on the gopher port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="31196"> <summary> Do not audit attempts to receive UDP traffic on the gopher port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_gopher_port" lineno="31215"> <summary> Send and receive UDP traffic on the gopher port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="31232"> <summary> Do not audit attempts to send and receive UDP traffic on the gopher port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_gopher_port" lineno="31248"> <summary> Bind TCP sockets to the gopher port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_gopher_port" lineno="31268"> <summary> Bind UDP sockets to the gopher port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_gopher_port" lineno="31287"> <summary> Make a TCP connection to the gopher port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_gopher_client_packets" lineno="31307"> <summary> Send gopher_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_gopher_client_packets" lineno="31326"> <summary> Do not audit attempts to send gopher_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_gopher_client_packets" lineno="31345"> <summary> Receive gopher_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="31364"> <summary> Do not audit attempts to receive gopher_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_gopher_client_packets" lineno="31383"> <summary> Send and receive gopher_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="31399"> <summary> Do not audit attempts to send and receive gopher_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_gopher_client_packets" lineno="31414"> <summary> Relabel packets to gopher_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_gopher_server_packets" lineno="31434"> <summary> Send gopher_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_gopher_server_packets" lineno="31453"> <summary> Do not audit attempts to send gopher_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_gopher_server_packets" lineno="31472"> <summary> Receive gopher_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="31491"> <summary> Do not audit attempts to receive gopher_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_gopher_server_packets" lineno="31510"> <summary> Send and receive gopher_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="31526"> <summary> Do not audit attempts to send and receive gopher_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_gopher_server_packets" lineno="31541"> <summary> Relabel packets to gopher_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_gpsd_port" lineno="31563"> <summary> Send and receive TCP traffic on the gpsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_gpsd_port" lineno="31582"> <summary> Send UDP traffic on the gpsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="31601"> <summary> Do not audit attempts to send UDP traffic on the gpsd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_gpsd_port" lineno="31620"> <summary> Receive UDP traffic on the gpsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="31639"> <summary> Do not audit attempts to receive UDP traffic on the gpsd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_gpsd_port" lineno="31658"> <summary> Send and receive UDP traffic on the gpsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="31675"> <summary> Do not audit attempts to send and receive UDP traffic on the gpsd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_gpsd_port" lineno="31691"> <summary> Bind TCP sockets to the gpsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_gpsd_port" lineno="31711"> <summary> Bind UDP sockets to the gpsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_gpsd_port" lineno="31730"> <summary> Make a TCP connection to the gpsd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_gpsd_client_packets" lineno="31750"> <summary> Send gpsd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="31769"> <summary> Do not audit attempts to send gpsd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_gpsd_client_packets" lineno="31788"> <summary> Receive gpsd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="31807"> <summary> Do not audit attempts to receive gpsd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_gpsd_client_packets" lineno="31826"> <summary> Send and receive gpsd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="31842"> <summary> Do not audit attempts to send and receive gpsd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_gpsd_client_packets" lineno="31857"> <summary> Relabel packets to gpsd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_gpsd_server_packets" lineno="31877"> <summary> Send gpsd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="31896"> <summary> Do not audit attempts to send gpsd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_gpsd_server_packets" lineno="31915"> <summary> Receive gpsd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="31934"> <summary> Do not audit attempts to receive gpsd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_gpsd_server_packets" lineno="31953"> <summary> Send and receive gpsd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="31969"> <summary> Do not audit attempts to send and receive gpsd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_gpsd_server_packets" lineno="31984"> <summary> Relabel packets to gpsd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="32006"> <summary> Send and receive TCP traffic on the hddtemp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_hddtemp_port" lineno="32025"> <summary> Send UDP traffic on the hddtemp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="32044"> <summary> Do not audit attempts to send UDP traffic on the hddtemp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_hddtemp_port" lineno="32063"> <summary> Receive UDP traffic on the hddtemp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="32082"> <summary> Do not audit attempts to receive UDP traffic on the hddtemp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_hddtemp_port" lineno="32101"> <summary> Send and receive UDP traffic on the hddtemp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="32118"> <summary> Do not audit attempts to send and receive UDP traffic on the hddtemp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_hddtemp_port" lineno="32134"> <summary> Bind TCP sockets to the hddtemp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_hddtemp_port" lineno="32154"> <summary> Bind UDP sockets to the hddtemp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_hddtemp_port" lineno="32173"> <summary> Make a TCP connection to the hddtemp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_hddtemp_client_packets" lineno="32193"> <summary> Send hddtemp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="32212"> <summary> Do not audit attempts to send hddtemp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_hddtemp_client_packets" lineno="32231"> <summary> Receive hddtemp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="32250"> <summary> Do not audit attempts to receive hddtemp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_hddtemp_client_packets" lineno="32269"> <summary> Send and receive hddtemp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="32285"> <summary> Do not audit attempts to send and receive hddtemp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_hddtemp_client_packets" lineno="32300"> <summary> Relabel packets to hddtemp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_hddtemp_server_packets" lineno="32320"> <summary> Send hddtemp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="32339"> <summary> Do not audit attempts to send hddtemp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_hddtemp_server_packets" lineno="32358"> <summary> Receive hddtemp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="32377"> <summary> Do not audit attempts to receive hddtemp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_hddtemp_server_packets" lineno="32396"> <summary> Send and receive hddtemp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="32412"> <summary> Do not audit attempts to send and receive hddtemp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_hddtemp_server_packets" lineno="32427"> <summary> Relabel packets to hddtemp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_howl_port" lineno="32449"> <summary> Send and receive TCP traffic on the howl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_howl_port" lineno="32468"> <summary> Send UDP traffic on the howl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_howl_port" lineno="32487"> <summary> Do not audit attempts to send UDP traffic on the howl port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_howl_port" lineno="32506"> <summary> Receive UDP traffic on the howl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_howl_port" lineno="32525"> <summary> Do not audit attempts to receive UDP traffic on the howl port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_howl_port" lineno="32544"> <summary> Send and receive UDP traffic on the howl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="32561"> <summary> Do not audit attempts to send and receive UDP traffic on the howl port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_howl_port" lineno="32577"> <summary> Bind TCP sockets to the howl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_howl_port" lineno="32597"> <summary> Bind UDP sockets to the howl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_howl_port" lineno="32616"> <summary> Make a TCP connection to the howl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_howl_client_packets" lineno="32636"> <summary> Send howl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_howl_client_packets" lineno="32655"> <summary> Do not audit attempts to send howl_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_howl_client_packets" lineno="32674"> <summary> Receive howl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_howl_client_packets" lineno="32693"> <summary> Do not audit attempts to receive howl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_howl_client_packets" lineno="32712"> <summary> Send and receive howl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="32728"> <summary> Do not audit attempts to send and receive howl_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_howl_client_packets" lineno="32743"> <summary> Relabel packets to howl_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_howl_server_packets" lineno="32763"> <summary> Send howl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_howl_server_packets" lineno="32782"> <summary> Do not audit attempts to send howl_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_howl_server_packets" lineno="32801"> <summary> Receive howl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_howl_server_packets" lineno="32820"> <summary> Do not audit attempts to receive howl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_howl_server_packets" lineno="32839"> <summary> Send and receive howl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="32855"> <summary> Do not audit attempts to send and receive howl_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_howl_server_packets" lineno="32870"> <summary> Relabel packets to howl_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_hplip_port" lineno="32892"> <summary> Send and receive TCP traffic on the hplip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_hplip_port" lineno="32911"> <summary> Send UDP traffic on the hplip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_hplip_port" lineno="32930"> <summary> Do not audit attempts to send UDP traffic on the hplip port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_hplip_port" lineno="32949"> <summary> Receive UDP traffic on the hplip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="32968"> <summary> Do not audit attempts to receive UDP traffic on the hplip port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_hplip_port" lineno="32987"> <summary> Send and receive UDP traffic on the hplip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="33004"> <summary> Do not audit attempts to send and receive UDP traffic on the hplip port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_hplip_port" lineno="33020"> <summary> Bind TCP sockets to the hplip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_hplip_port" lineno="33040"> <summary> Bind UDP sockets to the hplip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_hplip_port" lineno="33059"> <summary> Make a TCP connection to the hplip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_hplip_client_packets" lineno="33079"> <summary> Send hplip_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_hplip_client_packets" lineno="33098"> <summary> Do not audit attempts to send hplip_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_hplip_client_packets" lineno="33117"> <summary> Receive hplip_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="33136"> <summary> Do not audit attempts to receive hplip_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_hplip_client_packets" lineno="33155"> <summary> Send and receive hplip_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="33171"> <summary> Do not audit attempts to send and receive hplip_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_hplip_client_packets" lineno="33186"> <summary> Relabel packets to hplip_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_hplip_server_packets" lineno="33206"> <summary> Send hplip_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_hplip_server_packets" lineno="33225"> <summary> Do not audit attempts to send hplip_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_hplip_server_packets" lineno="33244"> <summary> Receive hplip_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="33263"> <summary> Do not audit attempts to receive hplip_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_hplip_server_packets" lineno="33282"> <summary> Send and receive hplip_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="33298"> <summary> Do not audit attempts to send and receive hplip_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_hplip_server_packets" lineno="33313"> <summary> Relabel packets to hplip_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_http_port" lineno="33335"> <summary> Send and receive TCP traffic on the http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_http_port" lineno="33354"> <summary> Send UDP traffic on the http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_http_port" lineno="33373"> <summary> Do not audit attempts to send UDP traffic on the http port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_http_port" lineno="33392"> <summary> Receive UDP traffic on the http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_http_port" lineno="33411"> <summary> Do not audit attempts to receive UDP traffic on the http port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_http_port" lineno="33430"> <summary> Send and receive UDP traffic on the http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="33447"> <summary> Do not audit attempts to send and receive UDP traffic on the http port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_http_port" lineno="33463"> <summary> Bind TCP sockets to the http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_http_port" lineno="33483"> <summary> Bind UDP sockets to the http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_http_port" lineno="33502"> <summary> Make a TCP connection to the http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_http_client_packets" lineno="33522"> <summary> Send http_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_http_client_packets" lineno="33541"> <summary> Do not audit attempts to send http_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_http_client_packets" lineno="33560"> <summary> Receive http_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_http_client_packets" lineno="33579"> <summary> Do not audit attempts to receive http_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_http_client_packets" lineno="33598"> <summary> Send and receive http_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="33614"> <summary> Do not audit attempts to send and receive http_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_http_client_packets" lineno="33629"> <summary> Relabel packets to http_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_http_server_packets" lineno="33649"> <summary> Send http_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_http_server_packets" lineno="33668"> <summary> Do not audit attempts to send http_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_http_server_packets" lineno="33687"> <summary> Receive http_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_http_server_packets" lineno="33706"> <summary> Do not audit attempts to receive http_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_http_server_packets" lineno="33725"> <summary> Send and receive http_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="33741"> <summary> Do not audit attempts to send and receive http_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_http_server_packets" lineno="33756"> <summary> Relabel packets to http_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_http_cache_port" lineno="33778"> <summary> Send and receive TCP traffic on the http_cache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_http_cache_port" lineno="33797"> <summary> Send UDP traffic on the http_cache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="33816"> <summary> Do not audit attempts to send UDP traffic on the http_cache port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_http_cache_port" lineno="33835"> <summary> Receive UDP traffic on the http_cache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="33854"> <summary> Do not audit attempts to receive UDP traffic on the http_cache port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_http_cache_port" lineno="33873"> <summary> Send and receive UDP traffic on the http_cache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="33890"> <summary> Do not audit attempts to send and receive UDP traffic on the http_cache port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_http_cache_port" lineno="33906"> <summary> Bind TCP sockets to the http_cache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_http_cache_port" lineno="33926"> <summary> Bind UDP sockets to the http_cache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_http_cache_port" lineno="33945"> <summary> Make a TCP connection to the http_cache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_http_cache_client_packets" lineno="33965"> <summary> Send http_cache_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="33984"> <summary> Do not audit attempts to send http_cache_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_http_cache_client_packets" lineno="34003"> <summary> Receive http_cache_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="34022"> <summary> Do not audit attempts to receive http_cache_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_http_cache_client_packets" lineno="34041"> <summary> Send and receive http_cache_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="34057"> <summary> Do not audit attempts to send and receive http_cache_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_http_cache_client_packets" lineno="34072"> <summary> Relabel packets to http_cache_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_http_cache_server_packets" lineno="34092"> <summary> Send http_cache_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="34111"> <summary> Do not audit attempts to send http_cache_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_http_cache_server_packets" lineno="34130"> <summary> Receive http_cache_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="34149"> <summary> Do not audit attempts to receive http_cache_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_http_cache_server_packets" lineno="34168"> <summary> Send and receive http_cache_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="34184"> <summary> Do not audit attempts to send and receive http_cache_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_http_cache_server_packets" lineno="34199"> <summary> Relabel packets to http_cache_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="34221"> <summary> Send and receive TCP traffic on the i18n_input port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_i18n_input_port" lineno="34240"> <summary> Send UDP traffic on the i18n_input port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="34259"> <summary> Do not audit attempts to send UDP traffic on the i18n_input port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_i18n_input_port" lineno="34278"> <summary> Receive UDP traffic on the i18n_input port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="34297"> <summary> Do not audit attempts to receive UDP traffic on the i18n_input port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_i18n_input_port" lineno="34316"> <summary> Send and receive UDP traffic on the i18n_input port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="34333"> <summary> Do not audit attempts to send and receive UDP traffic on the i18n_input port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_i18n_input_port" lineno="34349"> <summary> Bind TCP sockets to the i18n_input port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_i18n_input_port" lineno="34369"> <summary> Bind UDP sockets to the i18n_input port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_i18n_input_port" lineno="34388"> <summary> Make a TCP connection to the i18n_input port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_i18n_input_client_packets" lineno="34408"> <summary> Send i18n_input_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="34427"> <summary> Do not audit attempts to send i18n_input_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_i18n_input_client_packets" lineno="34446"> <summary> Receive i18n_input_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="34465"> <summary> Do not audit attempts to receive i18n_input_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_i18n_input_client_packets" lineno="34484"> <summary> Send and receive i18n_input_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="34500"> <summary> Do not audit attempts to send and receive i18n_input_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_i18n_input_client_packets" lineno="34515"> <summary> Relabel packets to i18n_input_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_i18n_input_server_packets" lineno="34535"> <summary> Send i18n_input_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="34554"> <summary> Do not audit attempts to send i18n_input_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_i18n_input_server_packets" lineno="34573"> <summary> Receive i18n_input_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="34592"> <summary> Do not audit attempts to receive i18n_input_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_i18n_input_server_packets" lineno="34611"> <summary> Send and receive i18n_input_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="34627"> <summary> Do not audit attempts to send and receive i18n_input_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_i18n_input_server_packets" lineno="34642"> <summary> Relabel packets to i18n_input_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_imaze_port" lineno="34664"> <summary> Send and receive TCP traffic on the imaze port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_imaze_port" lineno="34683"> <summary> Send UDP traffic on the imaze port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_imaze_port" lineno="34702"> <summary> Do not audit attempts to send UDP traffic on the imaze port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_imaze_port" lineno="34721"> <summary> Receive UDP traffic on the imaze port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="34740"> <summary> Do not audit attempts to receive UDP traffic on the imaze port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_imaze_port" lineno="34759"> <summary> Send and receive UDP traffic on the imaze port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="34776"> <summary> Do not audit attempts to send and receive UDP traffic on the imaze port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_imaze_port" lineno="34792"> <summary> Bind TCP sockets to the imaze port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_imaze_port" lineno="34812"> <summary> Bind UDP sockets to the imaze port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_imaze_port" lineno="34831"> <summary> Make a TCP connection to the imaze port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_imaze_client_packets" lineno="34851"> <summary> Send imaze_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_imaze_client_packets" lineno="34870"> <summary> Do not audit attempts to send imaze_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_imaze_client_packets" lineno="34889"> <summary> Receive imaze_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="34908"> <summary> Do not audit attempts to receive imaze_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_imaze_client_packets" lineno="34927"> <summary> Send and receive imaze_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="34943"> <summary> Do not audit attempts to send and receive imaze_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_imaze_client_packets" lineno="34958"> <summary> Relabel packets to imaze_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_imaze_server_packets" lineno="34978"> <summary> Send imaze_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_imaze_server_packets" lineno="34997"> <summary> Do not audit attempts to send imaze_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_imaze_server_packets" lineno="35016"> <summary> Receive imaze_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="35035"> <summary> Do not audit attempts to receive imaze_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_imaze_server_packets" lineno="35054"> <summary> Send and receive imaze_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="35070"> <summary> Do not audit attempts to send and receive imaze_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_imaze_server_packets" lineno="35085"> <summary> Relabel packets to imaze_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="35107"> <summary> Send and receive TCP traffic on the inetd_child port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_inetd_child_port" lineno="35126"> <summary> Send UDP traffic on the inetd_child port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="35145"> <summary> Do not audit attempts to send UDP traffic on the inetd_child port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_inetd_child_port" lineno="35164"> <summary> Receive UDP traffic on the inetd_child port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="35183"> <summary> Do not audit attempts to receive UDP traffic on the inetd_child port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_inetd_child_port" lineno="35202"> <summary> Send and receive UDP traffic on the inetd_child port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="35219"> <summary> Do not audit attempts to send and receive UDP traffic on the inetd_child port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_inetd_child_port" lineno="35235"> <summary> Bind TCP sockets to the inetd_child port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_inetd_child_port" lineno="35255"> <summary> Bind UDP sockets to the inetd_child port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_inetd_child_port" lineno="35274"> <summary> Make a TCP connection to the inetd_child port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_inetd_child_client_packets" lineno="35294"> <summary> Send inetd_child_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="35313"> <summary> Do not audit attempts to send inetd_child_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_inetd_child_client_packets" lineno="35332"> <summary> Receive inetd_child_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="35351"> <summary> Do not audit attempts to receive inetd_child_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_inetd_child_client_packets" lineno="35370"> <summary> Send and receive inetd_child_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="35386"> <summary> Do not audit attempts to send and receive inetd_child_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_inetd_child_client_packets" lineno="35401"> <summary> Relabel packets to inetd_child_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_inetd_child_server_packets" lineno="35421"> <summary> Send inetd_child_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="35440"> <summary> Do not audit attempts to send inetd_child_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_inetd_child_server_packets" lineno="35459"> <summary> Receive inetd_child_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="35478"> <summary> Do not audit attempts to receive inetd_child_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_inetd_child_server_packets" lineno="35497"> <summary> Send and receive inetd_child_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="35513"> <summary> Do not audit attempts to send and receive inetd_child_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_inetd_child_server_packets" lineno="35528"> <summary> Relabel packets to inetd_child_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_innd_port" lineno="35550"> <summary> Send and receive TCP traffic on the innd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_innd_port" lineno="35569"> <summary> Send UDP traffic on the innd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_innd_port" lineno="35588"> <summary> Do not audit attempts to send UDP traffic on the innd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_innd_port" lineno="35607"> <summary> Receive UDP traffic on the innd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_innd_port" lineno="35626"> <summary> Do not audit attempts to receive UDP traffic on the innd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_innd_port" lineno="35645"> <summary> Send and receive UDP traffic on the innd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="35662"> <summary> Do not audit attempts to send and receive UDP traffic on the innd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_innd_port" lineno="35678"> <summary> Bind TCP sockets to the innd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_innd_port" lineno="35698"> <summary> Bind UDP sockets to the innd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_innd_port" lineno="35717"> <summary> Make a TCP connection to the innd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_innd_client_packets" lineno="35737"> <summary> Send innd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_innd_client_packets" lineno="35756"> <summary> Do not audit attempts to send innd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_innd_client_packets" lineno="35775"> <summary> Receive innd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_innd_client_packets" lineno="35794"> <summary> Do not audit attempts to receive innd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_innd_client_packets" lineno="35813"> <summary> Send and receive innd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="35829"> <summary> Do not audit attempts to send and receive innd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_innd_client_packets" lineno="35844"> <summary> Relabel packets to innd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_innd_server_packets" lineno="35864"> <summary> Send innd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_innd_server_packets" lineno="35883"> <summary> Do not audit attempts to send innd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_innd_server_packets" lineno="35902"> <summary> Receive innd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_innd_server_packets" lineno="35921"> <summary> Do not audit attempts to receive innd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_innd_server_packets" lineno="35940"> <summary> Send and receive innd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="35956"> <summary> Do not audit attempts to send and receive innd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_innd_server_packets" lineno="35971"> <summary> Relabel packets to innd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="35993"> <summary> Send and receive TCP traffic on the ionixnetmon port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ionixnetmon_port" lineno="36012"> <summary> Send UDP traffic on the ionixnetmon port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="36031"> <summary> Do not audit attempts to send UDP traffic on the ionixnetmon port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ionixnetmon_port" lineno="36050"> <summary> Receive UDP traffic on the ionixnetmon port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="36069"> <summary> Do not audit attempts to receive UDP traffic on the ionixnetmon port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="36088"> <summary> Send and receive UDP traffic on the ionixnetmon port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="36105"> <summary> Do not audit attempts to send and receive UDP traffic on the ionixnetmon port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ionixnetmon_port" lineno="36121"> <summary> Bind TCP sockets to the ionixnetmon port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ionixnetmon_port" lineno="36141"> <summary> Bind UDP sockets to the ionixnetmon port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ionixnetmon_port" lineno="36160"> <summary> Make a TCP connection to the ionixnetmon port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ionixnetmon_client_packets" lineno="36180"> <summary> Send ionixnetmon_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="36199"> <summary> Do not audit attempts to send ionixnetmon_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ionixnetmon_client_packets" lineno="36218"> <summary> Receive ionixnetmon_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="36237"> <summary> Do not audit attempts to receive ionixnetmon_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="36256"> <summary> Send and receive ionixnetmon_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="36272"> <summary> Do not audit attempts to send and receive ionixnetmon_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="36287"> <summary> Relabel packets to ionixnetmon_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ionixnetmon_server_packets" lineno="36307"> <summary> Send ionixnetmon_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="36326"> <summary> Do not audit attempts to send ionixnetmon_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ionixnetmon_server_packets" lineno="36345"> <summary> Receive ionixnetmon_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="36364"> <summary> Do not audit attempts to receive ionixnetmon_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="36383"> <summary> Send and receive ionixnetmon_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="36399"> <summary> Do not audit attempts to send and receive ionixnetmon_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="36414"> <summary> Relabel packets to ionixnetmon_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ipmi_port" lineno="36436"> <summary> Send and receive TCP traffic on the ipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ipmi_port" lineno="36455"> <summary> Send UDP traffic on the ipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="36474"> <summary> Do not audit attempts to send UDP traffic on the ipmi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ipmi_port" lineno="36493"> <summary> Receive UDP traffic on the ipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="36512"> <summary> Do not audit attempts to receive UDP traffic on the ipmi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ipmi_port" lineno="36531"> <summary> Send and receive UDP traffic on the ipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="36548"> <summary> Do not audit attempts to send and receive UDP traffic on the ipmi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ipmi_port" lineno="36564"> <summary> Bind TCP sockets to the ipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ipmi_port" lineno="36584"> <summary> Bind UDP sockets to the ipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ipmi_port" lineno="36603"> <summary> Make a TCP connection to the ipmi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ipmi_client_packets" lineno="36623"> <summary> Send ipmi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="36642"> <summary> Do not audit attempts to send ipmi_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ipmi_client_packets" lineno="36661"> <summary> Receive ipmi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="36680"> <summary> Do not audit attempts to receive ipmi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ipmi_client_packets" lineno="36699"> <summary> Send and receive ipmi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="36715"> <summary> Do not audit attempts to send and receive ipmi_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ipmi_client_packets" lineno="36730"> <summary> Relabel packets to ipmi_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ipmi_server_packets" lineno="36750"> <summary> Send ipmi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="36769"> <summary> Do not audit attempts to send ipmi_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ipmi_server_packets" lineno="36788"> <summary> Receive ipmi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="36807"> <summary> Do not audit attempts to receive ipmi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ipmi_server_packets" lineno="36826"> <summary> Send and receive ipmi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="36842"> <summary> Do not audit attempts to send and receive ipmi_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ipmi_server_packets" lineno="36857"> <summary> Relabel packets to ipmi_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ipp_port" lineno="36879"> <summary> Send and receive TCP traffic on the ipp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ipp_port" lineno="36898"> <summary> Send UDP traffic on the ipp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ipp_port" lineno="36917"> <summary> Do not audit attempts to send UDP traffic on the ipp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ipp_port" lineno="36936"> <summary> Receive UDP traffic on the ipp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="36955"> <summary> Do not audit attempts to receive UDP traffic on the ipp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ipp_port" lineno="36974"> <summary> Send and receive UDP traffic on the ipp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="36991"> <summary> Do not audit attempts to send and receive UDP traffic on the ipp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ipp_port" lineno="37007"> <summary> Bind TCP sockets to the ipp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ipp_port" lineno="37027"> <summary> Bind UDP sockets to the ipp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ipp_port" lineno="37046"> <summary> Make a TCP connection to the ipp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ipp_client_packets" lineno="37066"> <summary> Send ipp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ipp_client_packets" lineno="37085"> <summary> Do not audit attempts to send ipp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ipp_client_packets" lineno="37104"> <summary> Receive ipp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="37123"> <summary> Do not audit attempts to receive ipp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ipp_client_packets" lineno="37142"> <summary> Send and receive ipp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="37158"> <summary> Do not audit attempts to send and receive ipp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ipp_client_packets" lineno="37173"> <summary> Relabel packets to ipp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ipp_server_packets" lineno="37193"> <summary> Send ipp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ipp_server_packets" lineno="37212"> <summary> Do not audit attempts to send ipp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ipp_server_packets" lineno="37231"> <summary> Receive ipp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="37250"> <summary> Do not audit attempts to receive ipp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ipp_server_packets" lineno="37269"> <summary> Send and receive ipp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="37285"> <summary> Do not audit attempts to send and receive ipp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ipp_server_packets" lineno="37300"> <summary> Relabel packets to ipp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="37322"> <summary> Send and receive TCP traffic on the ipsecnat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ipsecnat_port" lineno="37341"> <summary> Send UDP traffic on the ipsecnat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="37360"> <summary> Do not audit attempts to send UDP traffic on the ipsecnat port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ipsecnat_port" lineno="37379"> <summary> Receive UDP traffic on the ipsecnat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="37398"> <summary> Do not audit attempts to receive UDP traffic on the ipsecnat port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="37417"> <summary> Send and receive UDP traffic on the ipsecnat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="37434"> <summary> Do not audit attempts to send and receive UDP traffic on the ipsecnat port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ipsecnat_port" lineno="37450"> <summary> Bind TCP sockets to the ipsecnat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ipsecnat_port" lineno="37470"> <summary> Bind UDP sockets to the ipsecnat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ipsecnat_port" lineno="37489"> <summary> Make a TCP connection to the ipsecnat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ipsecnat_client_packets" lineno="37509"> <summary> Send ipsecnat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="37528"> <summary> Do not audit attempts to send ipsecnat_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ipsecnat_client_packets" lineno="37547"> <summary> Receive ipsecnat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="37566"> <summary> Do not audit attempts to receive ipsecnat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="37585"> <summary> Send and receive ipsecnat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="37601"> <summary> Do not audit attempts to send and receive ipsecnat_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ipsecnat_client_packets" lineno="37616"> <summary> Relabel packets to ipsecnat_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ipsecnat_server_packets" lineno="37636"> <summary> Send ipsecnat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="37655"> <summary> Do not audit attempts to send ipsecnat_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ipsecnat_server_packets" lineno="37674"> <summary> Receive ipsecnat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="37693"> <summary> Do not audit attempts to receive ipsecnat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="37712"> <summary> Send and receive ipsecnat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="37728"> <summary> Do not audit attempts to send and receive ipsecnat_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ipsecnat_server_packets" lineno="37743"> <summary> Relabel packets to ipsecnat_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ircd_port" lineno="37765"> <summary> Send and receive TCP traffic on the ircd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ircd_port" lineno="37784"> <summary> Send UDP traffic on the ircd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ircd_port" lineno="37803"> <summary> Do not audit attempts to send UDP traffic on the ircd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ircd_port" lineno="37822"> <summary> Receive UDP traffic on the ircd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="37841"> <summary> Do not audit attempts to receive UDP traffic on the ircd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ircd_port" lineno="37860"> <summary> Send and receive UDP traffic on the ircd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="37877"> <summary> Do not audit attempts to send and receive UDP traffic on the ircd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ircd_port" lineno="37893"> <summary> Bind TCP sockets to the ircd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ircd_port" lineno="37913"> <summary> Bind UDP sockets to the ircd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ircd_port" lineno="37932"> <summary> Make a TCP connection to the ircd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ircd_client_packets" lineno="37952"> <summary> Send ircd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ircd_client_packets" lineno="37971"> <summary> Do not audit attempts to send ircd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ircd_client_packets" lineno="37990"> <summary> Receive ircd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="38009"> <summary> Do not audit attempts to receive ircd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ircd_client_packets" lineno="38028"> <summary> Send and receive ircd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="38044"> <summary> Do not audit attempts to send and receive ircd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ircd_client_packets" lineno="38059"> <summary> Relabel packets to ircd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ircd_server_packets" lineno="38079"> <summary> Send ircd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ircd_server_packets" lineno="38098"> <summary> Do not audit attempts to send ircd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ircd_server_packets" lineno="38117"> <summary> Receive ircd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="38136"> <summary> Do not audit attempts to receive ircd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ircd_server_packets" lineno="38155"> <summary> Send and receive ircd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="38171"> <summary> Do not audit attempts to send and receive ircd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ircd_server_packets" lineno="38186"> <summary> Relabel packets to ircd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_isakmp_port" lineno="38208"> <summary> Send and receive TCP traffic on the isakmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_isakmp_port" lineno="38227"> <summary> Send UDP traffic on the isakmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="38246"> <summary> Do not audit attempts to send UDP traffic on the isakmp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_isakmp_port" lineno="38265"> <summary> Receive UDP traffic on the isakmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="38284"> <summary> Do not audit attempts to receive UDP traffic on the isakmp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_isakmp_port" lineno="38303"> <summary> Send and receive UDP traffic on the isakmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="38320"> <summary> Do not audit attempts to send and receive UDP traffic on the isakmp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_isakmp_port" lineno="38336"> <summary> Bind TCP sockets to the isakmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_isakmp_port" lineno="38356"> <summary> Bind UDP sockets to the isakmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_isakmp_port" lineno="38375"> <summary> Make a TCP connection to the isakmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_isakmp_client_packets" lineno="38395"> <summary> Send isakmp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="38414"> <summary> Do not audit attempts to send isakmp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_isakmp_client_packets" lineno="38433"> <summary> Receive isakmp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="38452"> <summary> Do not audit attempts to receive isakmp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_isakmp_client_packets" lineno="38471"> <summary> Send and receive isakmp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="38487"> <summary> Do not audit attempts to send and receive isakmp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_isakmp_client_packets" lineno="38502"> <summary> Relabel packets to isakmp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_isakmp_server_packets" lineno="38522"> <summary> Send isakmp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="38541"> <summary> Do not audit attempts to send isakmp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_isakmp_server_packets" lineno="38560"> <summary> Receive isakmp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="38579"> <summary> Do not audit attempts to receive isakmp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_isakmp_server_packets" lineno="38598"> <summary> Send and receive isakmp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="38614"> <summary> Do not audit attempts to send and receive isakmp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_isakmp_server_packets" lineno="38629"> <summary> Relabel packets to isakmp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_iscsi_port" lineno="38651"> <summary> Send and receive TCP traffic on the iscsi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_iscsi_port" lineno="38670"> <summary> Send UDP traffic on the iscsi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="38689"> <summary> Do not audit attempts to send UDP traffic on the iscsi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_iscsi_port" lineno="38708"> <summary> Receive UDP traffic on the iscsi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="38727"> <summary> Do not audit attempts to receive UDP traffic on the iscsi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_iscsi_port" lineno="38746"> <summary> Send and receive UDP traffic on the iscsi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="38763"> <summary> Do not audit attempts to send and receive UDP traffic on the iscsi port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_iscsi_port" lineno="38779"> <summary> Bind TCP sockets to the iscsi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_iscsi_port" lineno="38799"> <summary> Bind UDP sockets to the iscsi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_iscsi_port" lineno="38818"> <summary> Make a TCP connection to the iscsi port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_iscsi_client_packets" lineno="38838"> <summary> Send iscsi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="38857"> <summary> Do not audit attempts to send iscsi_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_iscsi_client_packets" lineno="38876"> <summary> Receive iscsi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="38895"> <summary> Do not audit attempts to receive iscsi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_iscsi_client_packets" lineno="38914"> <summary> Send and receive iscsi_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="38930"> <summary> Do not audit attempts to send and receive iscsi_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_iscsi_client_packets" lineno="38945"> <summary> Relabel packets to iscsi_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_iscsi_server_packets" lineno="38965"> <summary> Send iscsi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="38984"> <summary> Do not audit attempts to send iscsi_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_iscsi_server_packets" lineno="39003"> <summary> Receive iscsi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="39022"> <summary> Do not audit attempts to receive iscsi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_iscsi_server_packets" lineno="39041"> <summary> Send and receive iscsi_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="39057"> <summary> Do not audit attempts to send and receive iscsi_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_iscsi_server_packets" lineno="39072"> <summary> Relabel packets to iscsi_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_isns_port" lineno="39094"> <summary> Send and receive TCP traffic on the isns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_isns_port" lineno="39113"> <summary> Send UDP traffic on the isns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_isns_port" lineno="39132"> <summary> Do not audit attempts to send UDP traffic on the isns port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_isns_port" lineno="39151"> <summary> Receive UDP traffic on the isns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_isns_port" lineno="39170"> <summary> Do not audit attempts to receive UDP traffic on the isns port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_isns_port" lineno="39189"> <summary> Send and receive UDP traffic on the isns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="39206"> <summary> Do not audit attempts to send and receive UDP traffic on the isns port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_isns_port" lineno="39222"> <summary> Bind TCP sockets to the isns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_isns_port" lineno="39242"> <summary> Bind UDP sockets to the isns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_isns_port" lineno="39261"> <summary> Make a TCP connection to the isns port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_isns_client_packets" lineno="39281"> <summary> Send isns_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_isns_client_packets" lineno="39300"> <summary> Do not audit attempts to send isns_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_isns_client_packets" lineno="39319"> <summary> Receive isns_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_isns_client_packets" lineno="39338"> <summary> Do not audit attempts to receive isns_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_isns_client_packets" lineno="39357"> <summary> Send and receive isns_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="39373"> <summary> Do not audit attempts to send and receive isns_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_isns_client_packets" lineno="39388"> <summary> Relabel packets to isns_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_isns_server_packets" lineno="39408"> <summary> Send isns_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_isns_server_packets" lineno="39427"> <summary> Do not audit attempts to send isns_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_isns_server_packets" lineno="39446"> <summary> Receive isns_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_isns_server_packets" lineno="39465"> <summary> Do not audit attempts to receive isns_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_isns_server_packets" lineno="39484"> <summary> Send and receive isns_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="39500"> <summary> Do not audit attempts to send and receive isns_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_isns_server_packets" lineno="39515"> <summary> Relabel packets to isns_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="39537"> <summary> Send and receive TCP traffic on the jabber_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_jabber_client_port" lineno="39556"> <summary> Send UDP traffic on the jabber_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="39575"> <summary> Do not audit attempts to send UDP traffic on the jabber_client port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_jabber_client_port" lineno="39594"> <summary> Receive UDP traffic on the jabber_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="39613"> <summary> Do not audit attempts to receive UDP traffic on the jabber_client port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_jabber_client_port" lineno="39632"> <summary> Send and receive UDP traffic on the jabber_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="39649"> <summary> Do not audit attempts to send and receive UDP traffic on the jabber_client port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_jabber_client_port" lineno="39665"> <summary> Bind TCP sockets to the jabber_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_jabber_client_port" lineno="39685"> <summary> Bind UDP sockets to the jabber_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_jabber_client_port" lineno="39704"> <summary> Make a TCP connection to the jabber_client port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jabber_client_client_packets" lineno="39724"> <summary> Send jabber_client_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="39743"> <summary> Do not audit attempts to send jabber_client_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jabber_client_client_packets" lineno="39762"> <summary> Receive jabber_client_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="39781"> <summary> Do not audit attempts to receive jabber_client_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jabber_client_client_packets" lineno="39800"> <summary> Send and receive jabber_client_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="39816"> <summary> Do not audit attempts to send and receive jabber_client_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jabber_client_client_packets" lineno="39831"> <summary> Relabel packets to jabber_client_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jabber_client_server_packets" lineno="39851"> <summary> Send jabber_client_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="39870"> <summary> Do not audit attempts to send jabber_client_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jabber_client_server_packets" lineno="39889"> <summary> Receive jabber_client_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="39908"> <summary> Do not audit attempts to receive jabber_client_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jabber_client_server_packets" lineno="39927"> <summary> Send and receive jabber_client_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="39943"> <summary> Do not audit attempts to send and receive jabber_client_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jabber_client_server_packets" lineno="39958"> <summary> Relabel packets to jabber_client_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="39980"> <summary> Send and receive TCP traffic on the jabber_interserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_jabber_interserver_port" lineno="39999"> <summary> Send UDP traffic on the jabber_interserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="40018"> <summary> Do not audit attempts to send UDP traffic on the jabber_interserver port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_jabber_interserver_port" lineno="40037"> <summary> Receive UDP traffic on the jabber_interserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="40056"> <summary> Do not audit attempts to receive UDP traffic on the jabber_interserver port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="40075"> <summary> Send and receive UDP traffic on the jabber_interserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="40092"> <summary> Do not audit attempts to send and receive UDP traffic on the jabber_interserver port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_jabber_interserver_port" lineno="40108"> <summary> Bind TCP sockets to the jabber_interserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_jabber_interserver_port" lineno="40128"> <summary> Bind UDP sockets to the jabber_interserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_jabber_interserver_port" lineno="40147"> <summary> Make a TCP connection to the jabber_interserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jabber_interserver_client_packets" lineno="40167"> <summary> Send jabber_interserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="40186"> <summary> Do not audit attempts to send jabber_interserver_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jabber_interserver_client_packets" lineno="40205"> <summary> Receive jabber_interserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="40224"> <summary> Do not audit attempts to receive jabber_interserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="40243"> <summary> Send and receive jabber_interserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="40259"> <summary> Do not audit attempts to send and receive jabber_interserver_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="40274"> <summary> Relabel packets to jabber_interserver_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jabber_interserver_server_packets" lineno="40294"> <summary> Send jabber_interserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="40313"> <summary> Do not audit attempts to send jabber_interserver_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jabber_interserver_server_packets" lineno="40332"> <summary> Receive jabber_interserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="40351"> <summary> Do not audit attempts to receive jabber_interserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="40370"> <summary> Send and receive jabber_interserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="40386"> <summary> Do not audit attempts to send and receive jabber_interserver_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="40401"> <summary> Relabel packets to jabber_interserver_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_jabber_router_port" lineno="40423"> <summary> Send and receive TCP traffic on the jabber_router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_jabber_router_port" lineno="40442"> <summary> Send UDP traffic on the jabber_router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_jabber_router_port" lineno="40461"> <summary> Do not audit attempts to send UDP traffic on the jabber_router port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_jabber_router_port" lineno="40480"> <summary> Receive UDP traffic on the jabber_router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_jabber_router_port" lineno="40499"> <summary> Do not audit attempts to receive UDP traffic on the jabber_router port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_jabber_router_port" lineno="40518"> <summary> Send and receive UDP traffic on the jabber_router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_jabber_router_port" lineno="40535"> <summary> Do not audit attempts to send and receive UDP traffic on the jabber_router port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_jabber_router_port" lineno="40551"> <summary> Bind TCP sockets to the jabber_router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_jabber_router_port" lineno="40571"> <summary> Bind UDP sockets to the jabber_router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_jabber_router_port" lineno="40590"> <summary> Make a TCP connection to the jabber_router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jabber_router_client_packets" lineno="40610"> <summary> Send jabber_router_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jabber_router_client_packets" lineno="40629"> <summary> Do not audit attempts to send jabber_router_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jabber_router_client_packets" lineno="40648"> <summary> Receive jabber_router_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jabber_router_client_packets" lineno="40667"> <summary> Do not audit attempts to receive jabber_router_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jabber_router_client_packets" lineno="40686"> <summary> Send and receive jabber_router_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jabber_router_client_packets" lineno="40702"> <summary> Do not audit attempts to send and receive jabber_router_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jabber_router_client_packets" lineno="40717"> <summary> Relabel packets to jabber_router_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jabber_router_server_packets" lineno="40737"> <summary> Send jabber_router_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jabber_router_server_packets" lineno="40756"> <summary> Do not audit attempts to send jabber_router_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jabber_router_server_packets" lineno="40775"> <summary> Receive jabber_router_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jabber_router_server_packets" lineno="40794"> <summary> Do not audit attempts to receive jabber_router_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jabber_router_server_packets" lineno="40813"> <summary> Send and receive jabber_router_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jabber_router_server_packets" lineno="40829"> <summary> Do not audit attempts to send and receive jabber_router_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jabber_router_server_packets" lineno="40844"> <summary> Relabel packets to jabber_router_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_jacorb_port" lineno="40866"> <summary> Send and receive TCP traffic on the jacorb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_jacorb_port" lineno="40885"> <summary> Send UDP traffic on the jacorb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_jacorb_port" lineno="40904"> <summary> Do not audit attempts to send UDP traffic on the jacorb port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_jacorb_port" lineno="40923"> <summary> Receive UDP traffic on the jacorb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_jacorb_port" lineno="40942"> <summary> Do not audit attempts to receive UDP traffic on the jacorb port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_jacorb_port" lineno="40961"> <summary> Send and receive UDP traffic on the jacorb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_jacorb_port" lineno="40978"> <summary> Do not audit attempts to send and receive UDP traffic on the jacorb port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_jacorb_port" lineno="40994"> <summary> Bind TCP sockets to the jacorb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_jacorb_port" lineno="41014"> <summary> Bind UDP sockets to the jacorb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_jacorb_port" lineno="41033"> <summary> Make a TCP connection to the jacorb port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jacorb_client_packets" lineno="41053"> <summary> Send jacorb_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jacorb_client_packets" lineno="41072"> <summary> Do not audit attempts to send jacorb_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jacorb_client_packets" lineno="41091"> <summary> Receive jacorb_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jacorb_client_packets" lineno="41110"> <summary> Do not audit attempts to receive jacorb_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jacorb_client_packets" lineno="41129"> <summary> Send and receive jacorb_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jacorb_client_packets" lineno="41145"> <summary> Do not audit attempts to send and receive jacorb_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jacorb_client_packets" lineno="41160"> <summary> Relabel packets to jacorb_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jacorb_server_packets" lineno="41180"> <summary> Send jacorb_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jacorb_server_packets" lineno="41199"> <summary> Do not audit attempts to send jacorb_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jacorb_server_packets" lineno="41218"> <summary> Receive jacorb_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jacorb_server_packets" lineno="41237"> <summary> Do not audit attempts to receive jacorb_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jacorb_server_packets" lineno="41256"> <summary> Send and receive jacorb_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jacorb_server_packets" lineno="41272"> <summary> Do not audit attempts to send and receive jacorb_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jacorb_server_packets" lineno="41287"> <summary> Relabel packets to jacorb_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_jboss_debug_port" lineno="41309"> <summary> Send and receive TCP traffic on the jboss_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_jboss_debug_port" lineno="41328"> <summary> Send UDP traffic on the jboss_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_jboss_debug_port" lineno="41347"> <summary> Do not audit attempts to send UDP traffic on the jboss_debug port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_jboss_debug_port" lineno="41366"> <summary> Receive UDP traffic on the jboss_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_jboss_debug_port" lineno="41385"> <summary> Do not audit attempts to receive UDP traffic on the jboss_debug port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_jboss_debug_port" lineno="41404"> <summary> Send and receive UDP traffic on the jboss_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_jboss_debug_port" lineno="41421"> <summary> Do not audit attempts to send and receive UDP traffic on the jboss_debug port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_jboss_debug_port" lineno="41437"> <summary> Bind TCP sockets to the jboss_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_jboss_debug_port" lineno="41457"> <summary> Bind UDP sockets to the jboss_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_jboss_debug_port" lineno="41476"> <summary> Make a TCP connection to the jboss_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jboss_debug_client_packets" lineno="41496"> <summary> Send jboss_debug_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jboss_debug_client_packets" lineno="41515"> <summary> Do not audit attempts to send jboss_debug_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jboss_debug_client_packets" lineno="41534"> <summary> Receive jboss_debug_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jboss_debug_client_packets" lineno="41553"> <summary> Do not audit attempts to receive jboss_debug_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jboss_debug_client_packets" lineno="41572"> <summary> Send and receive jboss_debug_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jboss_debug_client_packets" lineno="41588"> <summary> Do not audit attempts to send and receive jboss_debug_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jboss_debug_client_packets" lineno="41603"> <summary> Relabel packets to jboss_debug_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jboss_debug_server_packets" lineno="41623"> <summary> Send jboss_debug_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jboss_debug_server_packets" lineno="41642"> <summary> Do not audit attempts to send jboss_debug_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jboss_debug_server_packets" lineno="41661"> <summary> Receive jboss_debug_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jboss_debug_server_packets" lineno="41680"> <summary> Do not audit attempts to receive jboss_debug_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jboss_debug_server_packets" lineno="41699"> <summary> Send and receive jboss_debug_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jboss_debug_server_packets" lineno="41715"> <summary> Do not audit attempts to send and receive jboss_debug_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jboss_debug_server_packets" lineno="41730"> <summary> Relabel packets to jboss_debug_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_jboss_messaging_port" lineno="41752"> <summary> Send and receive TCP traffic on the jboss_messaging port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_jboss_messaging_port" lineno="41771"> <summary> Send UDP traffic on the jboss_messaging port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_jboss_messaging_port" lineno="41790"> <summary> Do not audit attempts to send UDP traffic on the jboss_messaging port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_jboss_messaging_port" lineno="41809"> <summary> Receive UDP traffic on the jboss_messaging port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_jboss_messaging_port" lineno="41828"> <summary> Do not audit attempts to receive UDP traffic on the jboss_messaging port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_jboss_messaging_port" lineno="41847"> <summary> Send and receive UDP traffic on the jboss_messaging port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_jboss_messaging_port" lineno="41864"> <summary> Do not audit attempts to send and receive UDP traffic on the jboss_messaging port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_jboss_messaging_port" lineno="41880"> <summary> Bind TCP sockets to the jboss_messaging port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_jboss_messaging_port" lineno="41900"> <summary> Bind UDP sockets to the jboss_messaging port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_jboss_messaging_port" lineno="41919"> <summary> Make a TCP connection to the jboss_messaging port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jboss_messaging_client_packets" lineno="41939"> <summary> Send jboss_messaging_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jboss_messaging_client_packets" lineno="41958"> <summary> Do not audit attempts to send jboss_messaging_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jboss_messaging_client_packets" lineno="41977"> <summary> Receive jboss_messaging_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jboss_messaging_client_packets" lineno="41996"> <summary> Do not audit attempts to receive jboss_messaging_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jboss_messaging_client_packets" lineno="42015"> <summary> Send and receive jboss_messaging_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jboss_messaging_client_packets" lineno="42031"> <summary> Do not audit attempts to send and receive jboss_messaging_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jboss_messaging_client_packets" lineno="42046"> <summary> Relabel packets to jboss_messaging_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jboss_messaging_server_packets" lineno="42066"> <summary> Send jboss_messaging_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jboss_messaging_server_packets" lineno="42085"> <summary> Do not audit attempts to send jboss_messaging_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jboss_messaging_server_packets" lineno="42104"> <summary> Receive jboss_messaging_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jboss_messaging_server_packets" lineno="42123"> <summary> Do not audit attempts to receive jboss_messaging_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jboss_messaging_server_packets" lineno="42142"> <summary> Send and receive jboss_messaging_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jboss_messaging_server_packets" lineno="42158"> <summary> Do not audit attempts to send and receive jboss_messaging_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jboss_messaging_server_packets" lineno="42173"> <summary> Relabel packets to jboss_messaging_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_jboss_management_port" lineno="42195"> <summary> Send and receive TCP traffic on the jboss_management port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_jboss_management_port" lineno="42214"> <summary> Send UDP traffic on the jboss_management port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_jboss_management_port" lineno="42233"> <summary> Do not audit attempts to send UDP traffic on the jboss_management port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_jboss_management_port" lineno="42252"> <summary> Receive UDP traffic on the jboss_management port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_jboss_management_port" lineno="42271"> <summary> Do not audit attempts to receive UDP traffic on the jboss_management port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_jboss_management_port" lineno="42290"> <summary> Send and receive UDP traffic on the jboss_management port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_jboss_management_port" lineno="42307"> <summary> Do not audit attempts to send and receive UDP traffic on the jboss_management port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_jboss_management_port" lineno="42323"> <summary> Bind TCP sockets to the jboss_management port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_jboss_management_port" lineno="42343"> <summary> Bind UDP sockets to the jboss_management port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_jboss_management_port" lineno="42362"> <summary> Make a TCP connection to the jboss_management port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jboss_management_client_packets" lineno="42382"> <summary> Send jboss_management_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jboss_management_client_packets" lineno="42401"> <summary> Do not audit attempts to send jboss_management_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jboss_management_client_packets" lineno="42420"> <summary> Receive jboss_management_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jboss_management_client_packets" lineno="42439"> <summary> Do not audit attempts to receive jboss_management_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jboss_management_client_packets" lineno="42458"> <summary> Send and receive jboss_management_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jboss_management_client_packets" lineno="42474"> <summary> Do not audit attempts to send and receive jboss_management_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jboss_management_client_packets" lineno="42489"> <summary> Relabel packets to jboss_management_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_jboss_management_server_packets" lineno="42509"> <summary> Send jboss_management_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_jboss_management_server_packets" lineno="42528"> <summary> Do not audit attempts to send jboss_management_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_jboss_management_server_packets" lineno="42547"> <summary> Receive jboss_management_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_jboss_management_server_packets" lineno="42566"> <summary> Do not audit attempts to receive jboss_management_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_jboss_management_server_packets" lineno="42585"> <summary> Send and receive jboss_management_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_jboss_management_server_packets" lineno="42601"> <summary> Do not audit attempts to send and receive jboss_management_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_jboss_management_server_packets" lineno="42616"> <summary> Relabel packets to jboss_management_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_kerberos_port" lineno="42638"> <summary> Send and receive TCP traffic on the kerberos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_kerberos_port" lineno="42657"> <summary> Send UDP traffic on the kerberos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="42676"> <summary> Do not audit attempts to send UDP traffic on the kerberos port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_kerberos_port" lineno="42695"> <summary> Receive UDP traffic on the kerberos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="42714"> <summary> Do not audit attempts to receive UDP traffic on the kerberos port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_kerberos_port" lineno="42733"> <summary> Send and receive UDP traffic on the kerberos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="42750"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_kerberos_port" lineno="42766"> <summary> Bind TCP sockets to the kerberos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_kerberos_port" lineno="42786"> <summary> Bind UDP sockets to the kerberos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_kerberos_port" lineno="42805"> <summary> Make a TCP connection to the kerberos port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kerberos_client_packets" lineno="42825"> <summary> Send kerberos_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="42844"> <summary> Do not audit attempts to send kerberos_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kerberos_client_packets" lineno="42863"> <summary> Receive kerberos_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="42882"> <summary> Do not audit attempts to receive kerberos_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kerberos_client_packets" lineno="42901"> <summary> Send and receive kerberos_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="42917"> <summary> Do not audit attempts to send and receive kerberos_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kerberos_client_packets" lineno="42932"> <summary> Relabel packets to kerberos_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kerberos_server_packets" lineno="42952"> <summary> Send kerberos_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="42971"> <summary> Do not audit attempts to send kerberos_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kerberos_server_packets" lineno="42990"> <summary> Receive kerberos_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="43009"> <summary> Do not audit attempts to receive kerberos_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kerberos_server_packets" lineno="43028"> <summary> Send and receive kerberos_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="43044"> <summary> Do not audit attempts to send and receive kerberos_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kerberos_server_packets" lineno="43059"> <summary> Relabel packets to kerberos_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="43081"> <summary> Send and receive TCP traffic on the kerberos_admin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_kerberos_admin_port" lineno="43100"> <summary> Send UDP traffic on the kerberos_admin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="43119"> <summary> Do not audit attempts to send UDP traffic on the kerberos_admin port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_kerberos_admin_port" lineno="43138"> <summary> Receive UDP traffic on the kerberos_admin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="43157"> <summary> Do not audit attempts to receive UDP traffic on the kerberos_admin port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="43176"> <summary> Send and receive UDP traffic on the kerberos_admin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="43193"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos_admin port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_kerberos_admin_port" lineno="43209"> <summary> Bind TCP sockets to the kerberos_admin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_kerberos_admin_port" lineno="43229"> <summary> Bind UDP sockets to the kerberos_admin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_kerberos_admin_port" lineno="43248"> <summary> Make a TCP connection to the kerberos_admin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kerberos_admin_client_packets" lineno="43268"> <summary> Send kerberos_admin_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="43287"> <summary> Do not audit attempts to send kerberos_admin_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kerberos_admin_client_packets" lineno="43306"> <summary> Receive kerberos_admin_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="43325"> <summary> Do not audit attempts to receive kerberos_admin_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="43344"> <summary> Send and receive kerberos_admin_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="43360"> <summary> Do not audit attempts to send and receive kerberos_admin_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="43375"> <summary> Relabel packets to kerberos_admin_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kerberos_admin_server_packets" lineno="43395"> <summary> Send kerberos_admin_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="43414"> <summary> Do not audit attempts to send kerberos_admin_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kerberos_admin_server_packets" lineno="43433"> <summary> Receive kerberos_admin_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="43452"> <summary> Do not audit attempts to receive kerberos_admin_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="43471"> <summary> Send and receive kerberos_admin_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="43487"> <summary> Do not audit attempts to send and receive kerberos_admin_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="43502"> <summary> Relabel packets to kerberos_admin_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_kerberos_master_port" lineno="43524"> <summary> Send and receive TCP traffic on the kerberos_master port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_kerberos_master_port" lineno="43543"> <summary> Send UDP traffic on the kerberos_master port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_kerberos_master_port" lineno="43562"> <summary> Do not audit attempts to send UDP traffic on the kerberos_master port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_kerberos_master_port" lineno="43581"> <summary> Receive UDP traffic on the kerberos_master port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_kerberos_master_port" lineno="43600"> <summary> Do not audit attempts to receive UDP traffic on the kerberos_master port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_kerberos_master_port" lineno="43619"> <summary> Send and receive UDP traffic on the kerberos_master port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_kerberos_master_port" lineno="43636"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos_master port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_kerberos_master_port" lineno="43652"> <summary> Bind TCP sockets to the kerberos_master port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_kerberos_master_port" lineno="43672"> <summary> Bind UDP sockets to the kerberos_master port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_kerberos_master_port" lineno="43691"> <summary> Make a TCP connection to the kerberos_master port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kerberos_master_client_packets" lineno="43711"> <summary> Send kerberos_master_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kerberos_master_client_packets" lineno="43730"> <summary> Do not audit attempts to send kerberos_master_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kerberos_master_client_packets" lineno="43749"> <summary> Receive kerberos_master_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kerberos_master_client_packets" lineno="43768"> <summary> Do not audit attempts to receive kerberos_master_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kerberos_master_client_packets" lineno="43787"> <summary> Send and receive kerberos_master_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kerberos_master_client_packets" lineno="43803"> <summary> Do not audit attempts to send and receive kerberos_master_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kerberos_master_client_packets" lineno="43818"> <summary> Relabel packets to kerberos_master_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kerberos_master_server_packets" lineno="43838"> <summary> Send kerberos_master_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kerberos_master_server_packets" lineno="43857"> <summary> Do not audit attempts to send kerberos_master_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kerberos_master_server_packets" lineno="43876"> <summary> Receive kerberos_master_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kerberos_master_server_packets" lineno="43895"> <summary> Do not audit attempts to receive kerberos_master_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kerberos_master_server_packets" lineno="43914"> <summary> Send and receive kerberos_master_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kerberos_master_server_packets" lineno="43930"> <summary> Do not audit attempts to send and receive kerberos_master_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kerberos_master_server_packets" lineno="43945"> <summary> Relabel packets to kerberos_master_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_kerberos_password_port" lineno="43967"> <summary> Send and receive TCP traffic on the kerberos_password port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_kerberos_password_port" lineno="43986"> <summary> Send UDP traffic on the kerberos_password port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_kerberos_password_port" lineno="44005"> <summary> Do not audit attempts to send UDP traffic on the kerberos_password port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_kerberos_password_port" lineno="44024"> <summary> Receive UDP traffic on the kerberos_password port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_kerberos_password_port" lineno="44043"> <summary> Do not audit attempts to receive UDP traffic on the kerberos_password port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_kerberos_password_port" lineno="44062"> <summary> Send and receive UDP traffic on the kerberos_password port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_kerberos_password_port" lineno="44079"> <summary> Do not audit attempts to send and receive UDP traffic on the kerberos_password port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_kerberos_password_port" lineno="44095"> <summary> Bind TCP sockets to the kerberos_password port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_kerberos_password_port" lineno="44115"> <summary> Bind UDP sockets to the kerberos_password port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_kerberos_password_port" lineno="44134"> <summary> Make a TCP connection to the kerberos_password port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kerberos_password_client_packets" lineno="44154"> <summary> Send kerberos_password_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kerberos_password_client_packets" lineno="44173"> <summary> Do not audit attempts to send kerberos_password_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kerberos_password_client_packets" lineno="44192"> <summary> Receive kerberos_password_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kerberos_password_client_packets" lineno="44211"> <summary> Do not audit attempts to receive kerberos_password_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kerberos_password_client_packets" lineno="44230"> <summary> Send and receive kerberos_password_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kerberos_password_client_packets" lineno="44246"> <summary> Do not audit attempts to send and receive kerberos_password_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kerberos_password_client_packets" lineno="44261"> <summary> Relabel packets to kerberos_password_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kerberos_password_server_packets" lineno="44281"> <summary> Send kerberos_password_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kerberos_password_server_packets" lineno="44300"> <summary> Do not audit attempts to send kerberos_password_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kerberos_password_server_packets" lineno="44319"> <summary> Receive kerberos_password_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kerberos_password_server_packets" lineno="44338"> <summary> Do not audit attempts to receive kerberos_password_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kerberos_password_server_packets" lineno="44357"> <summary> Send and receive kerberos_password_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kerberos_password_server_packets" lineno="44373"> <summary> Do not audit attempts to send and receive kerberos_password_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kerberos_password_server_packets" lineno="44388"> <summary> Relabel packets to kerberos_password_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_kismet_port" lineno="44410"> <summary> Send and receive TCP traffic on the kismet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_kismet_port" lineno="44429"> <summary> Send UDP traffic on the kismet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_kismet_port" lineno="44448"> <summary> Do not audit attempts to send UDP traffic on the kismet port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_kismet_port" lineno="44467"> <summary> Receive UDP traffic on the kismet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_kismet_port" lineno="44486"> <summary> Do not audit attempts to receive UDP traffic on the kismet port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_kismet_port" lineno="44505"> <summary> Send and receive UDP traffic on the kismet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_kismet_port" lineno="44522"> <summary> Do not audit attempts to send and receive UDP traffic on the kismet port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_kismet_port" lineno="44538"> <summary> Bind TCP sockets to the kismet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_kismet_port" lineno="44558"> <summary> Bind UDP sockets to the kismet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_kismet_port" lineno="44577"> <summary> Make a TCP connection to the kismet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kismet_client_packets" lineno="44597"> <summary> Send kismet_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kismet_client_packets" lineno="44616"> <summary> Do not audit attempts to send kismet_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kismet_client_packets" lineno="44635"> <summary> Receive kismet_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kismet_client_packets" lineno="44654"> <summary> Do not audit attempts to receive kismet_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kismet_client_packets" lineno="44673"> <summary> Send and receive kismet_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kismet_client_packets" lineno="44689"> <summary> Do not audit attempts to send and receive kismet_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kismet_client_packets" lineno="44704"> <summary> Relabel packets to kismet_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kismet_server_packets" lineno="44724"> <summary> Send kismet_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kismet_server_packets" lineno="44743"> <summary> Do not audit attempts to send kismet_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kismet_server_packets" lineno="44762"> <summary> Receive kismet_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kismet_server_packets" lineno="44781"> <summary> Do not audit attempts to receive kismet_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kismet_server_packets" lineno="44800"> <summary> Send and receive kismet_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kismet_server_packets" lineno="44816"> <summary> Do not audit attempts to send and receive kismet_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kismet_server_packets" lineno="44831"> <summary> Relabel packets to kismet_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_kprop_port" lineno="44853"> <summary> Send and receive TCP traffic on the kprop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_kprop_port" lineno="44872"> <summary> Send UDP traffic on the kprop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_kprop_port" lineno="44891"> <summary> Do not audit attempts to send UDP traffic on the kprop port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_kprop_port" lineno="44910"> <summary> Receive UDP traffic on the kprop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="44929"> <summary> Do not audit attempts to receive UDP traffic on the kprop port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_kprop_port" lineno="44948"> <summary> Send and receive UDP traffic on the kprop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="44965"> <summary> Do not audit attempts to send and receive UDP traffic on the kprop port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_kprop_port" lineno="44981"> <summary> Bind TCP sockets to the kprop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_kprop_port" lineno="45001"> <summary> Bind UDP sockets to the kprop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_kprop_port" lineno="45020"> <summary> Make a TCP connection to the kprop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kprop_client_packets" lineno="45040"> <summary> Send kprop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kprop_client_packets" lineno="45059"> <summary> Do not audit attempts to send kprop_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kprop_client_packets" lineno="45078"> <summary> Receive kprop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="45097"> <summary> Do not audit attempts to receive kprop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kprop_client_packets" lineno="45116"> <summary> Send and receive kprop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="45132"> <summary> Do not audit attempts to send and receive kprop_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kprop_client_packets" lineno="45147"> <summary> Relabel packets to kprop_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_kprop_server_packets" lineno="45167"> <summary> Send kprop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_kprop_server_packets" lineno="45186"> <summary> Do not audit attempts to send kprop_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_kprop_server_packets" lineno="45205"> <summary> Receive kprop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="45224"> <summary> Do not audit attempts to receive kprop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_kprop_server_packets" lineno="45243"> <summary> Send and receive kprop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="45259"> <summary> Do not audit attempts to send and receive kprop_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_kprop_server_packets" lineno="45274"> <summary> Relabel packets to kprop_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="45296"> <summary> Send and receive TCP traffic on the ktalkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ktalkd_port" lineno="45315"> <summary> Send UDP traffic on the ktalkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="45334"> <summary> Do not audit attempts to send UDP traffic on the ktalkd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ktalkd_port" lineno="45353"> <summary> Receive UDP traffic on the ktalkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="45372"> <summary> Do not audit attempts to receive UDP traffic on the ktalkd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ktalkd_port" lineno="45391"> <summary> Send and receive UDP traffic on the ktalkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="45408"> <summary> Do not audit attempts to send and receive UDP traffic on the ktalkd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ktalkd_port" lineno="45424"> <summary> Bind TCP sockets to the ktalkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ktalkd_port" lineno="45444"> <summary> Bind UDP sockets to the ktalkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ktalkd_port" lineno="45463"> <summary> Make a TCP connection to the ktalkd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ktalkd_client_packets" lineno="45483"> <summary> Send ktalkd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="45502"> <summary> Do not audit attempts to send ktalkd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ktalkd_client_packets" lineno="45521"> <summary> Receive ktalkd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="45540"> <summary> Do not audit attempts to receive ktalkd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ktalkd_client_packets" lineno="45559"> <summary> Send and receive ktalkd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="45575"> <summary> Do not audit attempts to send and receive ktalkd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ktalkd_client_packets" lineno="45590"> <summary> Relabel packets to ktalkd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ktalkd_server_packets" lineno="45610"> <summary> Send ktalkd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="45629"> <summary> Do not audit attempts to send ktalkd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ktalkd_server_packets" lineno="45648"> <summary> Receive ktalkd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="45667"> <summary> Do not audit attempts to receive ktalkd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ktalkd_server_packets" lineno="45686"> <summary> Send and receive ktalkd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="45702"> <summary> Do not audit attempts to send and receive ktalkd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ktalkd_server_packets" lineno="45717"> <summary> Relabel packets to ktalkd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ldap_port" lineno="45739"> <summary> Send and receive TCP traffic on the ldap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ldap_port" lineno="45758"> <summary> Send UDP traffic on the ldap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ldap_port" lineno="45777"> <summary> Do not audit attempts to send UDP traffic on the ldap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ldap_port" lineno="45796"> <summary> Receive UDP traffic on the ldap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="45815"> <summary> Do not audit attempts to receive UDP traffic on the ldap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ldap_port" lineno="45834"> <summary> Send and receive UDP traffic on the ldap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="45851"> <summary> Do not audit attempts to send and receive UDP traffic on the ldap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ldap_port" lineno="45867"> <summary> Bind TCP sockets to the ldap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ldap_port" lineno="45887"> <summary> Bind UDP sockets to the ldap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ldap_port" lineno="45906"> <summary> Make a TCP connection to the ldap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ldap_client_packets" lineno="45926"> <summary> Send ldap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ldap_client_packets" lineno="45945"> <summary> Do not audit attempts to send ldap_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ldap_client_packets" lineno="45964"> <summary> Receive ldap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="45983"> <summary> Do not audit attempts to receive ldap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ldap_client_packets" lineno="46002"> <summary> Send and receive ldap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="46018"> <summary> Do not audit attempts to send and receive ldap_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ldap_client_packets" lineno="46033"> <summary> Relabel packets to ldap_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ldap_server_packets" lineno="46053"> <summary> Send ldap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ldap_server_packets" lineno="46072"> <summary> Do not audit attempts to send ldap_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ldap_server_packets" lineno="46091"> <summary> Receive ldap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="46110"> <summary> Do not audit attempts to receive ldap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ldap_server_packets" lineno="46129"> <summary> Send and receive ldap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="46145"> <summary> Do not audit attempts to send and receive ldap_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ldap_server_packets" lineno="46160"> <summary> Relabel packets to ldap_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_lmtp_port" lineno="46182"> <summary> Send and receive TCP traffic on the lmtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_lmtp_port" lineno="46201"> <summary> Send UDP traffic on the lmtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="46220"> <summary> Do not audit attempts to send UDP traffic on the lmtp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_lmtp_port" lineno="46239"> <summary> Receive UDP traffic on the lmtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="46258"> <summary> Do not audit attempts to receive UDP traffic on the lmtp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_lmtp_port" lineno="46277"> <summary> Send and receive UDP traffic on the lmtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="46294"> <summary> Do not audit attempts to send and receive UDP traffic on the lmtp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_lmtp_port" lineno="46310"> <summary> Bind TCP sockets to the lmtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_lmtp_port" lineno="46330"> <summary> Bind UDP sockets to the lmtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_lmtp_port" lineno="46349"> <summary> Make a TCP connection to the lmtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_lmtp_client_packets" lineno="46369"> <summary> Send lmtp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="46388"> <summary> Do not audit attempts to send lmtp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_lmtp_client_packets" lineno="46407"> <summary> Receive lmtp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="46426"> <summary> Do not audit attempts to receive lmtp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_lmtp_client_packets" lineno="46445"> <summary> Send and receive lmtp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="46461"> <summary> Do not audit attempts to send and receive lmtp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_lmtp_client_packets" lineno="46476"> <summary> Relabel packets to lmtp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_lmtp_server_packets" lineno="46496"> <summary> Send lmtp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="46515"> <summary> Do not audit attempts to send lmtp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_lmtp_server_packets" lineno="46534"> <summary> Receive lmtp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="46553"> <summary> Do not audit attempts to receive lmtp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_lmtp_server_packets" lineno="46572"> <summary> Send and receive lmtp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="46588"> <summary> Do not audit attempts to send and receive lmtp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_lmtp_server_packets" lineno="46603"> <summary> Relabel packets to lmtp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_lirc_port" lineno="46625"> <summary> Send and receive TCP traffic on the lirc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_lirc_port" lineno="46644"> <summary> Send UDP traffic on the lirc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_lirc_port" lineno="46663"> <summary> Do not audit attempts to send UDP traffic on the lirc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_lirc_port" lineno="46682"> <summary> Receive UDP traffic on the lirc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="46701"> <summary> Do not audit attempts to receive UDP traffic on the lirc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_lirc_port" lineno="46720"> <summary> Send and receive UDP traffic on the lirc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="46737"> <summary> Do not audit attempts to send and receive UDP traffic on the lirc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_lirc_port" lineno="46753"> <summary> Bind TCP sockets to the lirc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_lirc_port" lineno="46773"> <summary> Bind UDP sockets to the lirc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_lirc_port" lineno="46792"> <summary> Make a TCP connection to the lirc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_lirc_client_packets" lineno="46812"> <summary> Send lirc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_lirc_client_packets" lineno="46831"> <summary> Do not audit attempts to send lirc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_lirc_client_packets" lineno="46850"> <summary> Receive lirc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="46869"> <summary> Do not audit attempts to receive lirc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_lirc_client_packets" lineno="46888"> <summary> Send and receive lirc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="46904"> <summary> Do not audit attempts to send and receive lirc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_lirc_client_packets" lineno="46919"> <summary> Relabel packets to lirc_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_lirc_server_packets" lineno="46939"> <summary> Send lirc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_lirc_server_packets" lineno="46958"> <summary> Do not audit attempts to send lirc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_lirc_server_packets" lineno="46977"> <summary> Receive lirc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="46996"> <summary> Do not audit attempts to receive lirc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_lirc_server_packets" lineno="47015"> <summary> Send and receive lirc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="47031"> <summary> Do not audit attempts to send and receive lirc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_lirc_server_packets" lineno="47046"> <summary> Relabel packets to lirc_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_luci_port" lineno="47068"> <summary> Send and receive TCP traffic on the luci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_luci_port" lineno="47087"> <summary> Send UDP traffic on the luci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_luci_port" lineno="47106"> <summary> Do not audit attempts to send UDP traffic on the luci port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_luci_port" lineno="47125"> <summary> Receive UDP traffic on the luci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_luci_port" lineno="47144"> <summary> Do not audit attempts to receive UDP traffic on the luci port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_luci_port" lineno="47163"> <summary> Send and receive UDP traffic on the luci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_luci_port" lineno="47180"> <summary> Do not audit attempts to send and receive UDP traffic on the luci port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_luci_port" lineno="47196"> <summary> Bind TCP sockets to the luci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_luci_port" lineno="47216"> <summary> Bind UDP sockets to the luci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_luci_port" lineno="47235"> <summary> Make a TCP connection to the luci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_luci_client_packets" lineno="47255"> <summary> Send luci_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_luci_client_packets" lineno="47274"> <summary> Do not audit attempts to send luci_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_luci_client_packets" lineno="47293"> <summary> Receive luci_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_luci_client_packets" lineno="47312"> <summary> Do not audit attempts to receive luci_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_luci_client_packets" lineno="47331"> <summary> Send and receive luci_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_luci_client_packets" lineno="47347"> <summary> Do not audit attempts to send and receive luci_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_luci_client_packets" lineno="47362"> <summary> Relabel packets to luci_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_luci_server_packets" lineno="47382"> <summary> Send luci_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_luci_server_packets" lineno="47401"> <summary> Do not audit attempts to send luci_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_luci_server_packets" lineno="47420"> <summary> Receive luci_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_luci_server_packets" lineno="47439"> <summary> Do not audit attempts to receive luci_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_luci_server_packets" lineno="47458"> <summary> Send and receive luci_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_luci_server_packets" lineno="47474"> <summary> Do not audit attempts to send and receive luci_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_luci_server_packets" lineno="47489"> <summary> Relabel packets to luci_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_l2tp_port" lineno="47511"> <summary> Send and receive TCP traffic on the l2tp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_l2tp_port" lineno="47530"> <summary> Send UDP traffic on the l2tp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="47549"> <summary> Do not audit attempts to send UDP traffic on the l2tp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_l2tp_port" lineno="47568"> <summary> Receive UDP traffic on the l2tp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="47587"> <summary> Do not audit attempts to receive UDP traffic on the l2tp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_l2tp_port" lineno="47606"> <summary> Send and receive UDP traffic on the l2tp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="47623"> <summary> Do not audit attempts to send and receive UDP traffic on the l2tp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_l2tp_port" lineno="47639"> <summary> Bind TCP sockets to the l2tp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_l2tp_port" lineno="47659"> <summary> Bind UDP sockets to the l2tp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_l2tp_port" lineno="47678"> <summary> Make a TCP connection to the l2tp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_l2tp_client_packets" lineno="47698"> <summary> Send l2tp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="47717"> <summary> Do not audit attempts to send l2tp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_l2tp_client_packets" lineno="47736"> <summary> Receive l2tp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="47755"> <summary> Do not audit attempts to receive l2tp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_l2tp_client_packets" lineno="47774"> <summary> Send and receive l2tp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="47790"> <summary> Do not audit attempts to send and receive l2tp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_l2tp_client_packets" lineno="47805"> <summary> Relabel packets to l2tp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_l2tp_server_packets" lineno="47825"> <summary> Send l2tp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="47844"> <summary> Do not audit attempts to send l2tp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_l2tp_server_packets" lineno="47863"> <summary> Receive l2tp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="47882"> <summary> Do not audit attempts to receive l2tp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_l2tp_server_packets" lineno="47901"> <summary> Send and receive l2tp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="47917"> <summary> Do not audit attempts to send and receive l2tp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_l2tp_server_packets" lineno="47932"> <summary> Relabel packets to l2tp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_mail_port" lineno="47954"> <summary> Send and receive TCP traffic on the mail port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_mail_port" lineno="47973"> <summary> Send UDP traffic on the mail port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_mail_port" lineno="47992"> <summary> Do not audit attempts to send UDP traffic on the mail port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_mail_port" lineno="48011"> <summary> Receive UDP traffic on the mail port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_mail_port" lineno="48030"> <summary> Do not audit attempts to receive UDP traffic on the mail port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_mail_port" lineno="48049"> <summary> Send and receive UDP traffic on the mail port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="48066"> <summary> Do not audit attempts to send and receive UDP traffic on the mail port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_mail_port" lineno="48082"> <summary> Bind TCP sockets to the mail port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_mail_port" lineno="48102"> <summary> Bind UDP sockets to the mail port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_mail_port" lineno="48121"> <summary> Make a TCP connection to the mail port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mail_client_packets" lineno="48141"> <summary> Send mail_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mail_client_packets" lineno="48160"> <summary> Do not audit attempts to send mail_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mail_client_packets" lineno="48179"> <summary> Receive mail_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mail_client_packets" lineno="48198"> <summary> Do not audit attempts to receive mail_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mail_client_packets" lineno="48217"> <summary> Send and receive mail_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="48233"> <summary> Do not audit attempts to send and receive mail_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mail_client_packets" lineno="48248"> <summary> Relabel packets to mail_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mail_server_packets" lineno="48268"> <summary> Send mail_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mail_server_packets" lineno="48287"> <summary> Do not audit attempts to send mail_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mail_server_packets" lineno="48306"> <summary> Receive mail_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mail_server_packets" lineno="48325"> <summary> Do not audit attempts to receive mail_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mail_server_packets" lineno="48344"> <summary> Send and receive mail_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="48360"> <summary> Do not audit attempts to send and receive mail_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mail_server_packets" lineno="48375"> <summary> Relabel packets to mail_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_matahari_port" lineno="48397"> <summary> Send and receive TCP traffic on the matahari port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_matahari_port" lineno="48416"> <summary> Send UDP traffic on the matahari port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_matahari_port" lineno="48435"> <summary> Do not audit attempts to send UDP traffic on the matahari port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_matahari_port" lineno="48454"> <summary> Receive UDP traffic on the matahari port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="48473"> <summary> Do not audit attempts to receive UDP traffic on the matahari port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_matahari_port" lineno="48492"> <summary> Send and receive UDP traffic on the matahari port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="48509"> <summary> Do not audit attempts to send and receive UDP traffic on the matahari port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_matahari_port" lineno="48525"> <summary> Bind TCP sockets to the matahari port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_matahari_port" lineno="48545"> <summary> Bind UDP sockets to the matahari port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_matahari_port" lineno="48564"> <summary> Make a TCP connection to the matahari port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_matahari_client_packets" lineno="48584"> <summary> Send matahari_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_matahari_client_packets" lineno="48603"> <summary> Do not audit attempts to send matahari_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_matahari_client_packets" lineno="48622"> <summary> Receive matahari_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="48641"> <summary> Do not audit attempts to receive matahari_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_matahari_client_packets" lineno="48660"> <summary> Send and receive matahari_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="48676"> <summary> Do not audit attempts to send and receive matahari_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_matahari_client_packets" lineno="48691"> <summary> Relabel packets to matahari_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_matahari_server_packets" lineno="48711"> <summary> Send matahari_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_matahari_server_packets" lineno="48730"> <summary> Do not audit attempts to send matahari_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_matahari_server_packets" lineno="48749"> <summary> Receive matahari_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="48768"> <summary> Do not audit attempts to receive matahari_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_matahari_server_packets" lineno="48787"> <summary> Send and receive matahari_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="48803"> <summary> Do not audit attempts to send and receive matahari_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_matahari_server_packets" lineno="48818"> <summary> Relabel packets to matahari_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_memcache_port" lineno="48840"> <summary> Send and receive TCP traffic on the memcache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_memcache_port" lineno="48859"> <summary> Send UDP traffic on the memcache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_memcache_port" lineno="48878"> <summary> Do not audit attempts to send UDP traffic on the memcache port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_memcache_port" lineno="48897"> <summary> Receive UDP traffic on the memcache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="48916"> <summary> Do not audit attempts to receive UDP traffic on the memcache port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_memcache_port" lineno="48935"> <summary> Send and receive UDP traffic on the memcache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="48952"> <summary> Do not audit attempts to send and receive UDP traffic on the memcache port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_memcache_port" lineno="48968"> <summary> Bind TCP sockets to the memcache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_memcache_port" lineno="48988"> <summary> Bind UDP sockets to the memcache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_memcache_port" lineno="49007"> <summary> Make a TCP connection to the memcache port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_memcache_client_packets" lineno="49027"> <summary> Send memcache_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_memcache_client_packets" lineno="49046"> <summary> Do not audit attempts to send memcache_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_memcache_client_packets" lineno="49065"> <summary> Receive memcache_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="49084"> <summary> Do not audit attempts to receive memcache_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_memcache_client_packets" lineno="49103"> <summary> Send and receive memcache_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="49119"> <summary> Do not audit attempts to send and receive memcache_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_memcache_client_packets" lineno="49134"> <summary> Relabel packets to memcache_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_memcache_server_packets" lineno="49154"> <summary> Send memcache_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_memcache_server_packets" lineno="49173"> <summary> Do not audit attempts to send memcache_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_memcache_server_packets" lineno="49192"> <summary> Receive memcache_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="49211"> <summary> Do not audit attempts to receive memcache_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_memcache_server_packets" lineno="49230"> <summary> Send and receive memcache_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="49246"> <summary> Do not audit attempts to send and receive memcache_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_memcache_server_packets" lineno="49261"> <summary> Relabel packets to memcache_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_milter_port" lineno="49283"> <summary> Send and receive TCP traffic on the milter port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_milter_port" lineno="49302"> <summary> Send UDP traffic on the milter port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_milter_port" lineno="49321"> <summary> Do not audit attempts to send UDP traffic on the milter port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_milter_port" lineno="49340"> <summary> Receive UDP traffic on the milter port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_milter_port" lineno="49359"> <summary> Do not audit attempts to receive UDP traffic on the milter port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_milter_port" lineno="49378"> <summary> Send and receive UDP traffic on the milter port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="49395"> <summary> Do not audit attempts to send and receive UDP traffic on the milter port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_milter_port" lineno="49411"> <summary> Bind TCP sockets to the milter port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_milter_port" lineno="49431"> <summary> Bind UDP sockets to the milter port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_milter_port" lineno="49450"> <summary> Make a TCP connection to the milter port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_milter_client_packets" lineno="49470"> <summary> Send milter_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_milter_client_packets" lineno="49489"> <summary> Do not audit attempts to send milter_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_milter_client_packets" lineno="49508"> <summary> Receive milter_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_milter_client_packets" lineno="49527"> <summary> Do not audit attempts to receive milter_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_milter_client_packets" lineno="49546"> <summary> Send and receive milter_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="49562"> <summary> Do not audit attempts to send and receive milter_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_milter_client_packets" lineno="49577"> <summary> Relabel packets to milter_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_milter_server_packets" lineno="49597"> <summary> Send milter_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_milter_server_packets" lineno="49616"> <summary> Do not audit attempts to send milter_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_milter_server_packets" lineno="49635"> <summary> Receive milter_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_milter_server_packets" lineno="49654"> <summary> Do not audit attempts to receive milter_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_milter_server_packets" lineno="49673"> <summary> Send and receive milter_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="49689"> <summary> Do not audit attempts to send and receive milter_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_milter_server_packets" lineno="49704"> <summary> Relabel packets to milter_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_mmcc_port" lineno="49726"> <summary> Send and receive TCP traffic on the mmcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_mmcc_port" lineno="49745"> <summary> Send UDP traffic on the mmcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="49764"> <summary> Do not audit attempts to send UDP traffic on the mmcc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_mmcc_port" lineno="49783"> <summary> Receive UDP traffic on the mmcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="49802"> <summary> Do not audit attempts to receive UDP traffic on the mmcc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_mmcc_port" lineno="49821"> <summary> Send and receive UDP traffic on the mmcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="49838"> <summary> Do not audit attempts to send and receive UDP traffic on the mmcc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_mmcc_port" lineno="49854"> <summary> Bind TCP sockets to the mmcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_mmcc_port" lineno="49874"> <summary> Bind UDP sockets to the mmcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_mmcc_port" lineno="49893"> <summary> Make a TCP connection to the mmcc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mmcc_client_packets" lineno="49913"> <summary> Send mmcc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="49932"> <summary> Do not audit attempts to send mmcc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mmcc_client_packets" lineno="49951"> <summary> Receive mmcc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="49970"> <summary> Do not audit attempts to receive mmcc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mmcc_client_packets" lineno="49989"> <summary> Send and receive mmcc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="50005"> <summary> Do not audit attempts to send and receive mmcc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mmcc_client_packets" lineno="50020"> <summary> Relabel packets to mmcc_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mmcc_server_packets" lineno="50040"> <summary> Send mmcc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="50059"> <summary> Do not audit attempts to send mmcc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mmcc_server_packets" lineno="50078"> <summary> Receive mmcc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="50097"> <summary> Do not audit attempts to receive mmcc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mmcc_server_packets" lineno="50116"> <summary> Send and receive mmcc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="50132"> <summary> Do not audit attempts to send and receive mmcc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mmcc_server_packets" lineno="50147"> <summary> Relabel packets to mmcc_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_mongod_port" lineno="50169"> <summary> Send and receive TCP traffic on the mongod port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_mongod_port" lineno="50188"> <summary> Send UDP traffic on the mongod port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_mongod_port" lineno="50207"> <summary> Do not audit attempts to send UDP traffic on the mongod port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_mongod_port" lineno="50226"> <summary> Receive UDP traffic on the mongod port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_mongod_port" lineno="50245"> <summary> Do not audit attempts to receive UDP traffic on the mongod port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_mongod_port" lineno="50264"> <summary> Send and receive UDP traffic on the mongod port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_mongod_port" lineno="50281"> <summary> Do not audit attempts to send and receive UDP traffic on the mongod port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_mongod_port" lineno="50297"> <summary> Bind TCP sockets to the mongod port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_mongod_port" lineno="50317"> <summary> Bind UDP sockets to the mongod port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_mongod_port" lineno="50336"> <summary> Make a TCP connection to the mongod port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mongod_client_packets" lineno="50356"> <summary> Send mongod_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mongod_client_packets" lineno="50375"> <summary> Do not audit attempts to send mongod_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mongod_client_packets" lineno="50394"> <summary> Receive mongod_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mongod_client_packets" lineno="50413"> <summary> Do not audit attempts to receive mongod_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mongod_client_packets" lineno="50432"> <summary> Send and receive mongod_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mongod_client_packets" lineno="50448"> <summary> Do not audit attempts to send and receive mongod_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mongod_client_packets" lineno="50463"> <summary> Relabel packets to mongod_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mongod_server_packets" lineno="50483"> <summary> Send mongod_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mongod_server_packets" lineno="50502"> <summary> Do not audit attempts to send mongod_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mongod_server_packets" lineno="50521"> <summary> Receive mongod_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mongod_server_packets" lineno="50540"> <summary> Do not audit attempts to receive mongod_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mongod_server_packets" lineno="50559"> <summary> Send and receive mongod_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mongod_server_packets" lineno="50575"> <summary> Do not audit attempts to send and receive mongod_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mongod_server_packets" lineno="50590"> <summary> Relabel packets to mongod_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_monopd_port" lineno="50612"> <summary> Send and receive TCP traffic on the monopd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_monopd_port" lineno="50631"> <summary> Send UDP traffic on the monopd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_monopd_port" lineno="50650"> <summary> Do not audit attempts to send UDP traffic on the monopd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_monopd_port" lineno="50669"> <summary> Receive UDP traffic on the monopd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="50688"> <summary> Do not audit attempts to receive UDP traffic on the monopd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_monopd_port" lineno="50707"> <summary> Send and receive UDP traffic on the monopd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="50724"> <summary> Do not audit attempts to send and receive UDP traffic on the monopd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_monopd_port" lineno="50740"> <summary> Bind TCP sockets to the monopd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_monopd_port" lineno="50760"> <summary> Bind UDP sockets to the monopd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_monopd_port" lineno="50779"> <summary> Make a TCP connection to the monopd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_monopd_client_packets" lineno="50799"> <summary> Send monopd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_monopd_client_packets" lineno="50818"> <summary> Do not audit attempts to send monopd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_monopd_client_packets" lineno="50837"> <summary> Receive monopd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="50856"> <summary> Do not audit attempts to receive monopd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_monopd_client_packets" lineno="50875"> <summary> Send and receive monopd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="50891"> <summary> Do not audit attempts to send and receive monopd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_monopd_client_packets" lineno="50906"> <summary> Relabel packets to monopd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_monopd_server_packets" lineno="50926"> <summary> Send monopd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_monopd_server_packets" lineno="50945"> <summary> Do not audit attempts to send monopd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_monopd_server_packets" lineno="50964"> <summary> Receive monopd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="50983"> <summary> Do not audit attempts to receive monopd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_monopd_server_packets" lineno="51002"> <summary> Send and receive monopd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="51018"> <summary> Do not audit attempts to send and receive monopd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_monopd_server_packets" lineno="51033"> <summary> Relabel packets to monopd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_mpd_port" lineno="51055"> <summary> Send and receive TCP traffic on the mpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_mpd_port" lineno="51074"> <summary> Send UDP traffic on the mpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_mpd_port" lineno="51093"> <summary> Do not audit attempts to send UDP traffic on the mpd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_mpd_port" lineno="51112"> <summary> Receive UDP traffic on the mpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="51131"> <summary> Do not audit attempts to receive UDP traffic on the mpd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_mpd_port" lineno="51150"> <summary> Send and receive UDP traffic on the mpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="51167"> <summary> Do not audit attempts to send and receive UDP traffic on the mpd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_mpd_port" lineno="51183"> <summary> Bind TCP sockets to the mpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_mpd_port" lineno="51203"> <summary> Bind UDP sockets to the mpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_mpd_port" lineno="51222"> <summary> Make a TCP connection to the mpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mpd_client_packets" lineno="51242"> <summary> Send mpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mpd_client_packets" lineno="51261"> <summary> Do not audit attempts to send mpd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mpd_client_packets" lineno="51280"> <summary> Receive mpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="51299"> <summary> Do not audit attempts to receive mpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mpd_client_packets" lineno="51318"> <summary> Send and receive mpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="51334"> <summary> Do not audit attempts to send and receive mpd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mpd_client_packets" lineno="51349"> <summary> Relabel packets to mpd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mpd_server_packets" lineno="51369"> <summary> Send mpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mpd_server_packets" lineno="51388"> <summary> Do not audit attempts to send mpd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mpd_server_packets" lineno="51407"> <summary> Receive mpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="51426"> <summary> Do not audit attempts to receive mpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mpd_server_packets" lineno="51445"> <summary> Send and receive mpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="51461"> <summary> Do not audit attempts to send and receive mpd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mpd_server_packets" lineno="51476"> <summary> Relabel packets to mpd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_msnp_port" lineno="51498"> <summary> Send and receive TCP traffic on the msnp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_msnp_port" lineno="51517"> <summary> Send UDP traffic on the msnp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_msnp_port" lineno="51536"> <summary> Do not audit attempts to send UDP traffic on the msnp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_msnp_port" lineno="51555"> <summary> Receive UDP traffic on the msnp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="51574"> <summary> Do not audit attempts to receive UDP traffic on the msnp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_msnp_port" lineno="51593"> <summary> Send and receive UDP traffic on the msnp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="51610"> <summary> Do not audit attempts to send and receive UDP traffic on the msnp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_msnp_port" lineno="51626"> <summary> Bind TCP sockets to the msnp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_msnp_port" lineno="51646"> <summary> Bind UDP sockets to the msnp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_msnp_port" lineno="51665"> <summary> Make a TCP connection to the msnp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_msnp_client_packets" lineno="51685"> <summary> Send msnp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_msnp_client_packets" lineno="51704"> <summary> Do not audit attempts to send msnp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_msnp_client_packets" lineno="51723"> <summary> Receive msnp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="51742"> <summary> Do not audit attempts to receive msnp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_msnp_client_packets" lineno="51761"> <summary> Send and receive msnp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="51777"> <summary> Do not audit attempts to send and receive msnp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_msnp_client_packets" lineno="51792"> <summary> Relabel packets to msnp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_msnp_server_packets" lineno="51812"> <summary> Send msnp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_msnp_server_packets" lineno="51831"> <summary> Do not audit attempts to send msnp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_msnp_server_packets" lineno="51850"> <summary> Receive msnp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="51869"> <summary> Do not audit attempts to receive msnp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_msnp_server_packets" lineno="51888"> <summary> Send and receive msnp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="51904"> <summary> Do not audit attempts to send and receive msnp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_msnp_server_packets" lineno="51919"> <summary> Relabel packets to msnp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_mssql_port" lineno="51941"> <summary> Send and receive TCP traffic on the mssql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_mssql_port" lineno="51960"> <summary> Send UDP traffic on the mssql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_mssql_port" lineno="51979"> <summary> Do not audit attempts to send UDP traffic on the mssql port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_mssql_port" lineno="51998"> <summary> Receive UDP traffic on the mssql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="52017"> <summary> Do not audit attempts to receive UDP traffic on the mssql port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_mssql_port" lineno="52036"> <summary> Send and receive UDP traffic on the mssql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="52053"> <summary> Do not audit attempts to send and receive UDP traffic on the mssql port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_mssql_port" lineno="52069"> <summary> Bind TCP sockets to the mssql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_mssql_port" lineno="52089"> <summary> Bind UDP sockets to the mssql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_mssql_port" lineno="52108"> <summary> Make a TCP connection to the mssql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mssql_client_packets" lineno="52128"> <summary> Send mssql_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mssql_client_packets" lineno="52147"> <summary> Do not audit attempts to send mssql_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mssql_client_packets" lineno="52166"> <summary> Receive mssql_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="52185"> <summary> Do not audit attempts to receive mssql_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mssql_client_packets" lineno="52204"> <summary> Send and receive mssql_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="52220"> <summary> Do not audit attempts to send and receive mssql_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mssql_client_packets" lineno="52235"> <summary> Relabel packets to mssql_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mssql_server_packets" lineno="52255"> <summary> Send mssql_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mssql_server_packets" lineno="52274"> <summary> Do not audit attempts to send mssql_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mssql_server_packets" lineno="52293"> <summary> Receive mssql_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="52312"> <summary> Do not audit attempts to receive mssql_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mssql_server_packets" lineno="52331"> <summary> Send and receive mssql_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="52347"> <summary> Do not audit attempts to send and receive mssql_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mssql_server_packets" lineno="52362"> <summary> Relabel packets to mssql_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_munin_port" lineno="52384"> <summary> Send and receive TCP traffic on the munin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_munin_port" lineno="52403"> <summary> Send UDP traffic on the munin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_munin_port" lineno="52422"> <summary> Do not audit attempts to send UDP traffic on the munin port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_munin_port" lineno="52441"> <summary> Receive UDP traffic on the munin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_munin_port" lineno="52460"> <summary> Do not audit attempts to receive UDP traffic on the munin port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_munin_port" lineno="52479"> <summary> Send and receive UDP traffic on the munin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="52496"> <summary> Do not audit attempts to send and receive UDP traffic on the munin port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_munin_port" lineno="52512"> <summary> Bind TCP sockets to the munin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_munin_port" lineno="52532"> <summary> Bind UDP sockets to the munin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_munin_port" lineno="52551"> <summary> Make a TCP connection to the munin port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_munin_client_packets" lineno="52571"> <summary> Send munin_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_munin_client_packets" lineno="52590"> <summary> Do not audit attempts to send munin_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_munin_client_packets" lineno="52609"> <summary> Receive munin_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_munin_client_packets" lineno="52628"> <summary> Do not audit attempts to receive munin_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_munin_client_packets" lineno="52647"> <summary> Send and receive munin_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="52663"> <summary> Do not audit attempts to send and receive munin_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_munin_client_packets" lineno="52678"> <summary> Relabel packets to munin_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_munin_server_packets" lineno="52698"> <summary> Send munin_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_munin_server_packets" lineno="52717"> <summary> Do not audit attempts to send munin_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_munin_server_packets" lineno="52736"> <summary> Receive munin_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_munin_server_packets" lineno="52755"> <summary> Do not audit attempts to receive munin_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_munin_server_packets" lineno="52774"> <summary> Send and receive munin_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="52790"> <summary> Do not audit attempts to send and receive munin_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_munin_server_packets" lineno="52805"> <summary> Relabel packets to munin_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_mysqld_port" lineno="52827"> <summary> Send and receive TCP traffic on the mysqld port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_mysqld_port" lineno="52846"> <summary> Send UDP traffic on the mysqld port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="52865"> <summary> Do not audit attempts to send UDP traffic on the mysqld port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_mysqld_port" lineno="52884"> <summary> Receive UDP traffic on the mysqld port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="52903"> <summary> Do not audit attempts to receive UDP traffic on the mysqld port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_mysqld_port" lineno="52922"> <summary> Send and receive UDP traffic on the mysqld port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="52939"> <summary> Do not audit attempts to send and receive UDP traffic on the mysqld port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_mysqld_port" lineno="52955"> <summary> Bind TCP sockets to the mysqld port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_mysqld_port" lineno="52975"> <summary> Bind UDP sockets to the mysqld port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_mysqld_port" lineno="52994"> <summary> Make a TCP connection to the mysqld port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mysqld_client_packets" lineno="53014"> <summary> Send mysqld_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="53033"> <summary> Do not audit attempts to send mysqld_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mysqld_client_packets" lineno="53052"> <summary> Receive mysqld_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="53071"> <summary> Do not audit attempts to receive mysqld_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mysqld_client_packets" lineno="53090"> <summary> Send and receive mysqld_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="53106"> <summary> Do not audit attempts to send and receive mysqld_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mysqld_client_packets" lineno="53121"> <summary> Relabel packets to mysqld_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mysqld_server_packets" lineno="53141"> <summary> Send mysqld_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="53160"> <summary> Do not audit attempts to send mysqld_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mysqld_server_packets" lineno="53179"> <summary> Receive mysqld_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="53198"> <summary> Do not audit attempts to receive mysqld_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mysqld_server_packets" lineno="53217"> <summary> Send and receive mysqld_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="53233"> <summary> Do not audit attempts to send and receive mysqld_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mysqld_server_packets" lineno="53248"> <summary> Relabel packets to mysqld_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="53270"> <summary> Send and receive TCP traffic on the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_mysqlmanagerd_port" lineno="53289"> <summary> Send UDP traffic on the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="53308"> <summary> Do not audit attempts to send UDP traffic on the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="53327"> <summary> Receive UDP traffic on the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="53346"> <summary> Do not audit attempts to receive UDP traffic on the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="53365"> <summary> Send and receive UDP traffic on the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="53382"> <summary> Do not audit attempts to send and receive UDP traffic on the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="53398"> <summary> Bind TCP sockets to the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="53418"> <summary> Bind UDP sockets to the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="53437"> <summary> Make a TCP connection to the mysqlmanagerd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mysqlmanagerd_client_packets" lineno="53457"> <summary> Send mysqlmanagerd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="53476"> <summary> Do not audit attempts to send mysqlmanagerd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="53495"> <summary> Receive mysqlmanagerd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="53514"> <summary> Do not audit attempts to receive mysqlmanagerd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="53533"> <summary> Send and receive mysqlmanagerd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="53549"> <summary> Do not audit attempts to send and receive mysqlmanagerd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="53564"> <summary> Relabel packets to mysqlmanagerd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mysqlmanagerd_server_packets" lineno="53584"> <summary> Send mysqlmanagerd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="53603"> <summary> Do not audit attempts to send mysqlmanagerd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="53622"> <summary> Receive mysqlmanagerd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="53641"> <summary> Do not audit attempts to receive mysqlmanagerd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="53660"> <summary> Send and receive mysqlmanagerd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="53676"> <summary> Do not audit attempts to send and receive mysqlmanagerd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="53691"> <summary> Relabel packets to mysqlmanagerd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="53713"> <summary> Send and receive TCP traffic on the movaz_ssc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_movaz_ssc_port" lineno="53732"> <summary> Send UDP traffic on the movaz_ssc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="53751"> <summary> Do not audit attempts to send UDP traffic on the movaz_ssc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_movaz_ssc_port" lineno="53770"> <summary> Receive UDP traffic on the movaz_ssc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="53789"> <summary> Do not audit attempts to receive UDP traffic on the movaz_ssc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="53808"> <summary> Send and receive UDP traffic on the movaz_ssc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="53825"> <summary> Do not audit attempts to send and receive UDP traffic on the movaz_ssc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_movaz_ssc_port" lineno="53841"> <summary> Bind TCP sockets to the movaz_ssc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_movaz_ssc_port" lineno="53861"> <summary> Bind UDP sockets to the movaz_ssc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_movaz_ssc_port" lineno="53880"> <summary> Make a TCP connection to the movaz_ssc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_movaz_ssc_client_packets" lineno="53900"> <summary> Send movaz_ssc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="53919"> <summary> Do not audit attempts to send movaz_ssc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_movaz_ssc_client_packets" lineno="53938"> <summary> Receive movaz_ssc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="53957"> <summary> Do not audit attempts to receive movaz_ssc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="53976"> <summary> Send and receive movaz_ssc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="53992"> <summary> Do not audit attempts to send and receive movaz_ssc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="54007"> <summary> Relabel packets to movaz_ssc_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_movaz_ssc_server_packets" lineno="54027"> <summary> Send movaz_ssc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="54046"> <summary> Do not audit attempts to send movaz_ssc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_movaz_ssc_server_packets" lineno="54065"> <summary> Receive movaz_ssc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="54084"> <summary> Do not audit attempts to receive movaz_ssc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="54103"> <summary> Send and receive movaz_ssc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="54119"> <summary> Do not audit attempts to send and receive movaz_ssc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="54134"> <summary> Relabel packets to movaz_ssc_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_mountd_port" lineno="54156"> <summary> Send and receive TCP traffic on the mountd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_mountd_port" lineno="54175"> <summary> Send UDP traffic on the mountd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_mountd_port" lineno="54194"> <summary> Do not audit attempts to send UDP traffic on the mountd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_mountd_port" lineno="54213"> <summary> Receive UDP traffic on the mountd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="54232"> <summary> Do not audit attempts to receive UDP traffic on the mountd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_mountd_port" lineno="54251"> <summary> Send and receive UDP traffic on the mountd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="54268"> <summary> Do not audit attempts to send and receive UDP traffic on the mountd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_mountd_port" lineno="54284"> <summary> Bind TCP sockets to the mountd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_mountd_port" lineno="54304"> <summary> Bind UDP sockets to the mountd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_mountd_port" lineno="54323"> <summary> Make a TCP connection to the mountd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mountd_client_packets" lineno="54343"> <summary> Send mountd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mountd_client_packets" lineno="54362"> <summary> Do not audit attempts to send mountd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mountd_client_packets" lineno="54381"> <summary> Receive mountd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="54400"> <summary> Do not audit attempts to receive mountd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mountd_client_packets" lineno="54419"> <summary> Send and receive mountd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="54435"> <summary> Do not audit attempts to send and receive mountd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mountd_client_packets" lineno="54450"> <summary> Relabel packets to mountd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_mountd_server_packets" lineno="54470"> <summary> Send mountd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_mountd_server_packets" lineno="54489"> <summary> Do not audit attempts to send mountd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_mountd_server_packets" lineno="54508"> <summary> Receive mountd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="54527"> <summary> Do not audit attempts to receive mountd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_mountd_server_packets" lineno="54546"> <summary> Send and receive mountd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="54562"> <summary> Do not audit attempts to send and receive mountd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_mountd_server_packets" lineno="54577"> <summary> Relabel packets to mountd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_nessus_port" lineno="54599"> <summary> Send and receive TCP traffic on the nessus port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_nessus_port" lineno="54618"> <summary> Send UDP traffic on the nessus port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_nessus_port" lineno="54637"> <summary> Do not audit attempts to send UDP traffic on the nessus port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_nessus_port" lineno="54656"> <summary> Receive UDP traffic on the nessus port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="54675"> <summary> Do not audit attempts to receive UDP traffic on the nessus port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_nessus_port" lineno="54694"> <summary> Send and receive UDP traffic on the nessus port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="54711"> <summary> Do not audit attempts to send and receive UDP traffic on the nessus port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_nessus_port" lineno="54727"> <summary> Bind TCP sockets to the nessus port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_nessus_port" lineno="54747"> <summary> Bind UDP sockets to the nessus port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_nessus_port" lineno="54766"> <summary> Make a TCP connection to the nessus port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_nessus_client_packets" lineno="54786"> <summary> Send nessus_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_nessus_client_packets" lineno="54805"> <summary> Do not audit attempts to send nessus_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_nessus_client_packets" lineno="54824"> <summary> Receive nessus_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="54843"> <summary> Do not audit attempts to receive nessus_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_nessus_client_packets" lineno="54862"> <summary> Send and receive nessus_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="54878"> <summary> Do not audit attempts to send and receive nessus_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_nessus_client_packets" lineno="54893"> <summary> Relabel packets to nessus_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_nessus_server_packets" lineno="54913"> <summary> Send nessus_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_nessus_server_packets" lineno="54932"> <summary> Do not audit attempts to send nessus_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_nessus_server_packets" lineno="54951"> <summary> Receive nessus_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="54970"> <summary> Do not audit attempts to receive nessus_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_nessus_server_packets" lineno="54989"> <summary> Send and receive nessus_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="55005"> <summary> Do not audit attempts to send and receive nessus_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_nessus_server_packets" lineno="55020"> <summary> Relabel packets to nessus_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_netport_port" lineno="55042"> <summary> Send and receive TCP traffic on the netport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_netport_port" lineno="55061"> <summary> Send UDP traffic on the netport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_netport_port" lineno="55080"> <summary> Do not audit attempts to send UDP traffic on the netport port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_netport_port" lineno="55099"> <summary> Receive UDP traffic on the netport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_netport_port" lineno="55118"> <summary> Do not audit attempts to receive UDP traffic on the netport port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_netport_port" lineno="55137"> <summary> Send and receive UDP traffic on the netport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="55154"> <summary> Do not audit attempts to send and receive UDP traffic on the netport port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_netport_port" lineno="55170"> <summary> Bind TCP sockets to the netport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_netport_port" lineno="55190"> <summary> Bind UDP sockets to the netport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_netport_port" lineno="55209"> <summary> Make a TCP connection to the netport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_netport_client_packets" lineno="55229"> <summary> Send netport_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_netport_client_packets" lineno="55248"> <summary> Do not audit attempts to send netport_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_netport_client_packets" lineno="55267"> <summary> Receive netport_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_netport_client_packets" lineno="55286"> <summary> Do not audit attempts to receive netport_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_netport_client_packets" lineno="55305"> <summary> Send and receive netport_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="55321"> <summary> Do not audit attempts to send and receive netport_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_netport_client_packets" lineno="55336"> <summary> Relabel packets to netport_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_netport_server_packets" lineno="55356"> <summary> Send netport_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_netport_server_packets" lineno="55375"> <summary> Do not audit attempts to send netport_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_netport_server_packets" lineno="55394"> <summary> Receive netport_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_netport_server_packets" lineno="55413"> <summary> Do not audit attempts to receive netport_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_netport_server_packets" lineno="55432"> <summary> Send and receive netport_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="55448"> <summary> Do not audit attempts to send and receive netport_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_netport_server_packets" lineno="55463"> <summary> Relabel packets to netport_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_netsupport_port" lineno="55485"> <summary> Send and receive TCP traffic on the netsupport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_netsupport_port" lineno="55504"> <summary> Send UDP traffic on the netsupport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="55523"> <summary> Do not audit attempts to send UDP traffic on the netsupport port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_netsupport_port" lineno="55542"> <summary> Receive UDP traffic on the netsupport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="55561"> <summary> Do not audit attempts to receive UDP traffic on the netsupport port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_netsupport_port" lineno="55580"> <summary> Send and receive UDP traffic on the netsupport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="55597"> <summary> Do not audit attempts to send and receive UDP traffic on the netsupport port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_netsupport_port" lineno="55613"> <summary> Bind TCP sockets to the netsupport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_netsupport_port" lineno="55633"> <summary> Bind UDP sockets to the netsupport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_netsupport_port" lineno="55652"> <summary> Make a TCP connection to the netsupport port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_netsupport_client_packets" lineno="55672"> <summary> Send netsupport_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="55691"> <summary> Do not audit attempts to send netsupport_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_netsupport_client_packets" lineno="55710"> <summary> Receive netsupport_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="55729"> <summary> Do not audit attempts to receive netsupport_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_netsupport_client_packets" lineno="55748"> <summary> Send and receive netsupport_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="55764"> <summary> Do not audit attempts to send and receive netsupport_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_netsupport_client_packets" lineno="55779"> <summary> Relabel packets to netsupport_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_netsupport_server_packets" lineno="55799"> <summary> Send netsupport_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="55818"> <summary> Do not audit attempts to send netsupport_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_netsupport_server_packets" lineno="55837"> <summary> Receive netsupport_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="55856"> <summary> Do not audit attempts to receive netsupport_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_netsupport_server_packets" lineno="55875"> <summary> Send and receive netsupport_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="55891"> <summary> Do not audit attempts to send and receive netsupport_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_netsupport_server_packets" lineno="55906"> <summary> Relabel packets to netsupport_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_nfs_port" lineno="55928"> <summary> Send and receive TCP traffic on the nfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_nfs_port" lineno="55947"> <summary> Send UDP traffic on the nfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_nfs_port" lineno="55966"> <summary> Do not audit attempts to send UDP traffic on the nfs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_nfs_port" lineno="55985"> <summary> Receive UDP traffic on the nfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="56004"> <summary> Do not audit attempts to receive UDP traffic on the nfs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_nfs_port" lineno="56023"> <summary> Send and receive UDP traffic on the nfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="56040"> <summary> Do not audit attempts to send and receive UDP traffic on the nfs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_nfs_port" lineno="56056"> <summary> Bind TCP sockets to the nfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_nfs_port" lineno="56076"> <summary> Bind UDP sockets to the nfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_nfs_port" lineno="56095"> <summary> Make a TCP connection to the nfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_nfs_client_packets" lineno="56115"> <summary> Send nfs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_nfs_client_packets" lineno="56134"> <summary> Do not audit attempts to send nfs_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_nfs_client_packets" lineno="56153"> <summary> Receive nfs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="56172"> <summary> Do not audit attempts to receive nfs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_nfs_client_packets" lineno="56191"> <summary> Send and receive nfs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="56207"> <summary> Do not audit attempts to send and receive nfs_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_nfs_client_packets" lineno="56222"> <summary> Relabel packets to nfs_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_nfs_server_packets" lineno="56242"> <summary> Send nfs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_nfs_server_packets" lineno="56261"> <summary> Do not audit attempts to send nfs_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_nfs_server_packets" lineno="56280"> <summary> Receive nfs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="56299"> <summary> Do not audit attempts to receive nfs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_nfs_server_packets" lineno="56318"> <summary> Send and receive nfs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="56334"> <summary> Do not audit attempts to send and receive nfs_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_nfs_server_packets" lineno="56349"> <summary> Relabel packets to nfs_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_nmbd_port" lineno="56371"> <summary> Send and receive TCP traffic on the nmbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_nmbd_port" lineno="56390"> <summary> Send UDP traffic on the nmbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="56409"> <summary> Do not audit attempts to send UDP traffic on the nmbd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_nmbd_port" lineno="56428"> <summary> Receive UDP traffic on the nmbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="56447"> <summary> Do not audit attempts to receive UDP traffic on the nmbd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_nmbd_port" lineno="56466"> <summary> Send and receive UDP traffic on the nmbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="56483"> <summary> Do not audit attempts to send and receive UDP traffic on the nmbd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_nmbd_port" lineno="56499"> <summary> Bind TCP sockets to the nmbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_nmbd_port" lineno="56519"> <summary> Bind UDP sockets to the nmbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_nmbd_port" lineno="56538"> <summary> Make a TCP connection to the nmbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_nmbd_client_packets" lineno="56558"> <summary> Send nmbd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="56577"> <summary> Do not audit attempts to send nmbd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_nmbd_client_packets" lineno="56596"> <summary> Receive nmbd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="56615"> <summary> Do not audit attempts to receive nmbd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_nmbd_client_packets" lineno="56634"> <summary> Send and receive nmbd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="56650"> <summary> Do not audit attempts to send and receive nmbd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_nmbd_client_packets" lineno="56665"> <summary> Relabel packets to nmbd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_nmbd_server_packets" lineno="56685"> <summary> Send nmbd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="56704"> <summary> Do not audit attempts to send nmbd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_nmbd_server_packets" lineno="56723"> <summary> Receive nmbd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="56742"> <summary> Do not audit attempts to receive nmbd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_nmbd_server_packets" lineno="56761"> <summary> Send and receive nmbd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="56777"> <summary> Do not audit attempts to send and receive nmbd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_nmbd_server_packets" lineno="56792"> <summary> Relabel packets to nmbd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_nodejs_debug_port" lineno="56814"> <summary> Send and receive TCP traffic on the nodejs_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_nodejs_debug_port" lineno="56833"> <summary> Send UDP traffic on the nodejs_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_nodejs_debug_port" lineno="56852"> <summary> Do not audit attempts to send UDP traffic on the nodejs_debug port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_nodejs_debug_port" lineno="56871"> <summary> Receive UDP traffic on the nodejs_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_nodejs_debug_port" lineno="56890"> <summary> Do not audit attempts to receive UDP traffic on the nodejs_debug port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_nodejs_debug_port" lineno="56909"> <summary> Send and receive UDP traffic on the nodejs_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_nodejs_debug_port" lineno="56926"> <summary> Do not audit attempts to send and receive UDP traffic on the nodejs_debug port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_nodejs_debug_port" lineno="56942"> <summary> Bind TCP sockets to the nodejs_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_nodejs_debug_port" lineno="56962"> <summary> Bind UDP sockets to the nodejs_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_nodejs_debug_port" lineno="56981"> <summary> Make a TCP connection to the nodejs_debug port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_nodejs_debug_client_packets" lineno="57001"> <summary> Send nodejs_debug_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_nodejs_debug_client_packets" lineno="57020"> <summary> Do not audit attempts to send nodejs_debug_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_nodejs_debug_client_packets" lineno="57039"> <summary> Receive nodejs_debug_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_nodejs_debug_client_packets" lineno="57058"> <summary> Do not audit attempts to receive nodejs_debug_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_nodejs_debug_client_packets" lineno="57077"> <summary> Send and receive nodejs_debug_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_nodejs_debug_client_packets" lineno="57093"> <summary> Do not audit attempts to send and receive nodejs_debug_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_nodejs_debug_client_packets" lineno="57108"> <summary> Relabel packets to nodejs_debug_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_nodejs_debug_server_packets" lineno="57128"> <summary> Send nodejs_debug_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_nodejs_debug_server_packets" lineno="57147"> <summary> Do not audit attempts to send nodejs_debug_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_nodejs_debug_server_packets" lineno="57166"> <summary> Receive nodejs_debug_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_nodejs_debug_server_packets" lineno="57185"> <summary> Do not audit attempts to receive nodejs_debug_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_nodejs_debug_server_packets" lineno="57204"> <summary> Send and receive nodejs_debug_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_nodejs_debug_server_packets" lineno="57220"> <summary> Do not audit attempts to send and receive nodejs_debug_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_nodejs_debug_server_packets" lineno="57235"> <summary> Relabel packets to nodejs_debug_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ntp_port" lineno="57257"> <summary> Send and receive TCP traffic on the ntp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ntp_port" lineno="57276"> <summary> Send UDP traffic on the ntp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ntp_port" lineno="57295"> <summary> Do not audit attempts to send UDP traffic on the ntp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ntp_port" lineno="57314"> <summary> Receive UDP traffic on the ntp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="57333"> <summary> Do not audit attempts to receive UDP traffic on the ntp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ntp_port" lineno="57352"> <summary> Send and receive UDP traffic on the ntp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="57369"> <summary> Do not audit attempts to send and receive UDP traffic on the ntp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ntp_port" lineno="57385"> <summary> Bind TCP sockets to the ntp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ntp_port" lineno="57405"> <summary> Bind UDP sockets to the ntp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ntp_port" lineno="57424"> <summary> Make a TCP connection to the ntp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ntp_client_packets" lineno="57444"> <summary> Send ntp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ntp_client_packets" lineno="57463"> <summary> Do not audit attempts to send ntp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ntp_client_packets" lineno="57482"> <summary> Receive ntp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="57501"> <summary> Do not audit attempts to receive ntp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ntp_client_packets" lineno="57520"> <summary> Send and receive ntp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="57536"> <summary> Do not audit attempts to send and receive ntp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ntp_client_packets" lineno="57551"> <summary> Relabel packets to ntp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ntp_server_packets" lineno="57571"> <summary> Send ntp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ntp_server_packets" lineno="57590"> <summary> Do not audit attempts to send ntp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ntp_server_packets" lineno="57609"> <summary> Receive ntp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="57628"> <summary> Do not audit attempts to receive ntp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ntp_server_packets" lineno="57647"> <summary> Send and receive ntp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="57663"> <summary> Do not audit attempts to send and receive ntp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ntp_server_packets" lineno="57678"> <summary> Relabel packets to ntp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ntop_port" lineno="57700"> <summary> Send and receive TCP traffic on the ntop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ntop_port" lineno="57719"> <summary> Send UDP traffic on the ntop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ntop_port" lineno="57738"> <summary> Do not audit attempts to send UDP traffic on the ntop port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ntop_port" lineno="57757"> <summary> Receive UDP traffic on the ntop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="57776"> <summary> Do not audit attempts to receive UDP traffic on the ntop port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ntop_port" lineno="57795"> <summary> Send and receive UDP traffic on the ntop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="57812"> <summary> Do not audit attempts to send and receive UDP traffic on the ntop port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ntop_port" lineno="57828"> <summary> Bind TCP sockets to the ntop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ntop_port" lineno="57848"> <summary> Bind UDP sockets to the ntop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ntop_port" lineno="57867"> <summary> Make a TCP connection to the ntop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ntop_client_packets" lineno="57887"> <summary> Send ntop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ntop_client_packets" lineno="57906"> <summary> Do not audit attempts to send ntop_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ntop_client_packets" lineno="57925"> <summary> Receive ntop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="57944"> <summary> Do not audit attempts to receive ntop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ntop_client_packets" lineno="57963"> <summary> Send and receive ntop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="57979"> <summary> Do not audit attempts to send and receive ntop_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ntop_client_packets" lineno="57994"> <summary> Relabel packets to ntop_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ntop_server_packets" lineno="58014"> <summary> Send ntop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ntop_server_packets" lineno="58033"> <summary> Do not audit attempts to send ntop_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ntop_server_packets" lineno="58052"> <summary> Receive ntop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="58071"> <summary> Do not audit attempts to receive ntop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ntop_server_packets" lineno="58090"> <summary> Send and receive ntop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="58106"> <summary> Do not audit attempts to send and receive ntop_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ntop_server_packets" lineno="58121"> <summary> Relabel packets to ntop_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_oracle_port" lineno="58143"> <summary> Send and receive TCP traffic on the oracle port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_oracle_port" lineno="58162"> <summary> Send UDP traffic on the oracle port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_oracle_port" lineno="58181"> <summary> Do not audit attempts to send UDP traffic on the oracle port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_oracle_port" lineno="58200"> <summary> Receive UDP traffic on the oracle port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_oracle_port" lineno="58219"> <summary> Do not audit attempts to receive UDP traffic on the oracle port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_oracle_port" lineno="58238"> <summary> Send and receive UDP traffic on the oracle port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_oracle_port" lineno="58255"> <summary> Do not audit attempts to send and receive UDP traffic on the oracle port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_oracle_port" lineno="58271"> <summary> Bind TCP sockets to the oracle port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_oracle_port" lineno="58291"> <summary> Bind UDP sockets to the oracle port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_oracle_port" lineno="58310"> <summary> Make a TCP connection to the oracle port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_oracle_client_packets" lineno="58330"> <summary> Send oracle_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_oracle_client_packets" lineno="58349"> <summary> Do not audit attempts to send oracle_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_oracle_client_packets" lineno="58368"> <summary> Receive oracle_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_oracle_client_packets" lineno="58387"> <summary> Do not audit attempts to receive oracle_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_oracle_client_packets" lineno="58406"> <summary> Send and receive oracle_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_oracle_client_packets" lineno="58422"> <summary> Do not audit attempts to send and receive oracle_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_oracle_client_packets" lineno="58437"> <summary> Relabel packets to oracle_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_oracle_server_packets" lineno="58457"> <summary> Send oracle_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_oracle_server_packets" lineno="58476"> <summary> Do not audit attempts to send oracle_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_oracle_server_packets" lineno="58495"> <summary> Receive oracle_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_oracle_server_packets" lineno="58514"> <summary> Do not audit attempts to receive oracle_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_oracle_server_packets" lineno="58533"> <summary> Send and receive oracle_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_oracle_server_packets" lineno="58549"> <summary> Do not audit attempts to send and receive oracle_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_oracle_server_packets" lineno="58564"> <summary> Relabel packets to oracle_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ocsp_port" lineno="58586"> <summary> Send and receive TCP traffic on the ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ocsp_port" lineno="58605"> <summary> Send UDP traffic on the ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="58624"> <summary> Do not audit attempts to send UDP traffic on the ocsp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ocsp_port" lineno="58643"> <summary> Receive UDP traffic on the ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="58662"> <summary> Do not audit attempts to receive UDP traffic on the ocsp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ocsp_port" lineno="58681"> <summary> Send and receive UDP traffic on the ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="58698"> <summary> Do not audit attempts to send and receive UDP traffic on the ocsp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ocsp_port" lineno="58714"> <summary> Bind TCP sockets to the ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ocsp_port" lineno="58734"> <summary> Bind UDP sockets to the ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ocsp_port" lineno="58753"> <summary> Make a TCP connection to the ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ocsp_client_packets" lineno="58773"> <summary> Send ocsp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="58792"> <summary> Do not audit attempts to send ocsp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ocsp_client_packets" lineno="58811"> <summary> Receive ocsp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="58830"> <summary> Do not audit attempts to receive ocsp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ocsp_client_packets" lineno="58849"> <summary> Send and receive ocsp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="58865"> <summary> Do not audit attempts to send and receive ocsp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ocsp_client_packets" lineno="58880"> <summary> Relabel packets to ocsp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ocsp_server_packets" lineno="58900"> <summary> Send ocsp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="58919"> <summary> Do not audit attempts to send ocsp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ocsp_server_packets" lineno="58938"> <summary> Receive ocsp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="58957"> <summary> Do not audit attempts to receive ocsp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ocsp_server_packets" lineno="58976"> <summary> Send and receive ocsp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="58992"> <summary> Do not audit attempts to send and receive ocsp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ocsp_server_packets" lineno="59007"> <summary> Relabel packets to ocsp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_openhpid_port" lineno="59029"> <summary> Send and receive TCP traffic on the openhpid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_openhpid_port" lineno="59048"> <summary> Send UDP traffic on the openhpid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="59067"> <summary> Do not audit attempts to send UDP traffic on the openhpid port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_openhpid_port" lineno="59086"> <summary> Receive UDP traffic on the openhpid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="59105"> <summary> Do not audit attempts to receive UDP traffic on the openhpid port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_openhpid_port" lineno="59124"> <summary> Send and receive UDP traffic on the openhpid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="59141"> <summary> Do not audit attempts to send and receive UDP traffic on the openhpid port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_openhpid_port" lineno="59157"> <summary> Bind TCP sockets to the openhpid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_openhpid_port" lineno="59177"> <summary> Bind UDP sockets to the openhpid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_openhpid_port" lineno="59196"> <summary> Make a TCP connection to the openhpid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_openhpid_client_packets" lineno="59216"> <summary> Send openhpid_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="59235"> <summary> Do not audit attempts to send openhpid_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_openhpid_client_packets" lineno="59254"> <summary> Receive openhpid_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="59273"> <summary> Do not audit attempts to receive openhpid_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_openhpid_client_packets" lineno="59292"> <summary> Send and receive openhpid_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="59308"> <summary> Do not audit attempts to send and receive openhpid_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_openhpid_client_packets" lineno="59323"> <summary> Relabel packets to openhpid_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_openhpid_server_packets" lineno="59343"> <summary> Send openhpid_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="59362"> <summary> Do not audit attempts to send openhpid_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_openhpid_server_packets" lineno="59381"> <summary> Receive openhpid_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="59400"> <summary> Do not audit attempts to receive openhpid_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_openhpid_server_packets" lineno="59419"> <summary> Send and receive openhpid_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="59435"> <summary> Do not audit attempts to send and receive openhpid_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_openhpid_server_packets" lineno="59450"> <summary> Relabel packets to openhpid_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_openvpn_port" lineno="59472"> <summary> Send and receive TCP traffic on the openvpn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_openvpn_port" lineno="59491"> <summary> Send UDP traffic on the openvpn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="59510"> <summary> Do not audit attempts to send UDP traffic on the openvpn port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_openvpn_port" lineno="59529"> <summary> Receive UDP traffic on the openvpn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="59548"> <summary> Do not audit attempts to receive UDP traffic on the openvpn port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_openvpn_port" lineno="59567"> <summary> Send and receive UDP traffic on the openvpn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="59584"> <summary> Do not audit attempts to send and receive UDP traffic on the openvpn port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_openvpn_port" lineno="59600"> <summary> Bind TCP sockets to the openvpn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_openvpn_port" lineno="59620"> <summary> Bind UDP sockets to the openvpn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_openvpn_port" lineno="59639"> <summary> Make a TCP connection to the openvpn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_openvpn_client_packets" lineno="59659"> <summary> Send openvpn_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="59678"> <summary> Do not audit attempts to send openvpn_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_openvpn_client_packets" lineno="59697"> <summary> Receive openvpn_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="59716"> <summary> Do not audit attempts to receive openvpn_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_openvpn_client_packets" lineno="59735"> <summary> Send and receive openvpn_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="59751"> <summary> Do not audit attempts to send and receive openvpn_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_openvpn_client_packets" lineno="59766"> <summary> Relabel packets to openvpn_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_openvpn_server_packets" lineno="59786"> <summary> Send openvpn_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="59805"> <summary> Do not audit attempts to send openvpn_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_openvpn_server_packets" lineno="59824"> <summary> Receive openvpn_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="59843"> <summary> Do not audit attempts to receive openvpn_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_openvpn_server_packets" lineno="59862"> <summary> Send and receive openvpn_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="59878"> <summary> Do not audit attempts to send and receive openvpn_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_openvpn_server_packets" lineno="59893"> <summary> Relabel packets to openvpn_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pktcable_port" lineno="59915"> <summary> Send and receive TCP traffic on the pktcable port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pktcable_port" lineno="59934"> <summary> Send UDP traffic on the pktcable port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pktcable_port" lineno="59953"> <summary> Do not audit attempts to send UDP traffic on the pktcable port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pktcable_port" lineno="59972"> <summary> Receive UDP traffic on the pktcable port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pktcable_port" lineno="59991"> <summary> Do not audit attempts to receive UDP traffic on the pktcable port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pktcable_port" lineno="60010"> <summary> Send and receive UDP traffic on the pktcable port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pktcable_port" lineno="60027"> <summary> Do not audit attempts to send and receive UDP traffic on the pktcable port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pktcable_port" lineno="60043"> <summary> Bind TCP sockets to the pktcable port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pktcable_port" lineno="60063"> <summary> Bind UDP sockets to the pktcable port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pktcable_port" lineno="60082"> <summary> Make a TCP connection to the pktcable port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pktcable_client_packets" lineno="60102"> <summary> Send pktcable_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pktcable_client_packets" lineno="60121"> <summary> Do not audit attempts to send pktcable_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pktcable_client_packets" lineno="60140"> <summary> Receive pktcable_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pktcable_client_packets" lineno="60159"> <summary> Do not audit attempts to receive pktcable_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pktcable_client_packets" lineno="60178"> <summary> Send and receive pktcable_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pktcable_client_packets" lineno="60194"> <summary> Do not audit attempts to send and receive pktcable_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pktcable_client_packets" lineno="60209"> <summary> Relabel packets to pktcable_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pktcable_server_packets" lineno="60229"> <summary> Send pktcable_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pktcable_server_packets" lineno="60248"> <summary> Do not audit attempts to send pktcable_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pktcable_server_packets" lineno="60267"> <summary> Receive pktcable_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pktcable_server_packets" lineno="60286"> <summary> Do not audit attempts to receive pktcable_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pktcable_server_packets" lineno="60305"> <summary> Send and receive pktcable_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pktcable_server_packets" lineno="60321"> <summary> Do not audit attempts to send and receive pktcable_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pktcable_server_packets" lineno="60336"> <summary> Relabel packets to pktcable_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="60358"> <summary> Send and receive TCP traffic on the pegasus_http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pegasus_http_port" lineno="60377"> <summary> Send UDP traffic on the pegasus_http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="60396"> <summary> Do not audit attempts to send UDP traffic on the pegasus_http port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pegasus_http_port" lineno="60415"> <summary> Receive UDP traffic on the pegasus_http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="60434"> <summary> Do not audit attempts to receive UDP traffic on the pegasus_http port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="60453"> <summary> Send and receive UDP traffic on the pegasus_http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="60470"> <summary> Do not audit attempts to send and receive UDP traffic on the pegasus_http port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pegasus_http_port" lineno="60486"> <summary> Bind TCP sockets to the pegasus_http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pegasus_http_port" lineno="60506"> <summary> Bind UDP sockets to the pegasus_http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pegasus_http_port" lineno="60525"> <summary> Make a TCP connection to the pegasus_http port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pegasus_http_client_packets" lineno="60545"> <summary> Send pegasus_http_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="60564"> <summary> Do not audit attempts to send pegasus_http_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pegasus_http_client_packets" lineno="60583"> <summary> Receive pegasus_http_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="60602"> <summary> Do not audit attempts to receive pegasus_http_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="60621"> <summary> Send and receive pegasus_http_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="60637"> <summary> Do not audit attempts to send and receive pegasus_http_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pegasus_http_client_packets" lineno="60652"> <summary> Relabel packets to pegasus_http_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pegasus_http_server_packets" lineno="60672"> <summary> Send pegasus_http_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="60691"> <summary> Do not audit attempts to send pegasus_http_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pegasus_http_server_packets" lineno="60710"> <summary> Receive pegasus_http_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="60729"> <summary> Do not audit attempts to receive pegasus_http_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="60748"> <summary> Send and receive pegasus_http_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="60764"> <summary> Do not audit attempts to send and receive pegasus_http_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pegasus_http_server_packets" lineno="60779"> <summary> Relabel packets to pegasus_http_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="60801"> <summary> Send and receive TCP traffic on the pegasus_https port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pegasus_https_port" lineno="60820"> <summary> Send UDP traffic on the pegasus_https port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="60839"> <summary> Do not audit attempts to send UDP traffic on the pegasus_https port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pegasus_https_port" lineno="60858"> <summary> Receive UDP traffic on the pegasus_https port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="60877"> <summary> Do not audit attempts to receive UDP traffic on the pegasus_https port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="60896"> <summary> Send and receive UDP traffic on the pegasus_https port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="60913"> <summary> Do not audit attempts to send and receive UDP traffic on the pegasus_https port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pegasus_https_port" lineno="60929"> <summary> Bind TCP sockets to the pegasus_https port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pegasus_https_port" lineno="60949"> <summary> Bind UDP sockets to the pegasus_https port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pegasus_https_port" lineno="60968"> <summary> Make a TCP connection to the pegasus_https port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pegasus_https_client_packets" lineno="60988"> <summary> Send pegasus_https_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="61007"> <summary> Do not audit attempts to send pegasus_https_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pegasus_https_client_packets" lineno="61026"> <summary> Receive pegasus_https_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="61045"> <summary> Do not audit attempts to receive pegasus_https_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="61064"> <summary> Send and receive pegasus_https_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="61080"> <summary> Do not audit attempts to send and receive pegasus_https_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pegasus_https_client_packets" lineno="61095"> <summary> Relabel packets to pegasus_https_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pegasus_https_server_packets" lineno="61115"> <summary> Send pegasus_https_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="61134"> <summary> Do not audit attempts to send pegasus_https_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pegasus_https_server_packets" lineno="61153"> <summary> Receive pegasus_https_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="61172"> <summary> Do not audit attempts to receive pegasus_https_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="61191"> <summary> Send and receive pegasus_https_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="61207"> <summary> Do not audit attempts to send and receive pegasus_https_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pegasus_https_server_packets" lineno="61222"> <summary> Relabel packets to pegasus_https_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="61244"> <summary> Send and receive TCP traffic on the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pgpkeyserver_port" lineno="61263"> <summary> Send UDP traffic on the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="61282"> <summary> Do not audit attempts to send UDP traffic on the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pgpkeyserver_port" lineno="61301"> <summary> Receive UDP traffic on the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="61320"> <summary> Do not audit attempts to receive UDP traffic on the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="61339"> <summary> Send and receive UDP traffic on the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="61356"> <summary> Do not audit attempts to send and receive UDP traffic on the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="61372"> <summary> Bind TCP sockets to the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pgpkeyserver_port" lineno="61392"> <summary> Bind UDP sockets to the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="61411"> <summary> Make a TCP connection to the pgpkeyserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pgpkeyserver_client_packets" lineno="61431"> <summary> Send pgpkeyserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="61450"> <summary> Do not audit attempts to send pgpkeyserver_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pgpkeyserver_client_packets" lineno="61469"> <summary> Receive pgpkeyserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="61488"> <summary> Do not audit attempts to receive pgpkeyserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="61507"> <summary> Send and receive pgpkeyserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="61523"> <summary> Do not audit attempts to send and receive pgpkeyserver_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="61538"> <summary> Relabel packets to pgpkeyserver_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pgpkeyserver_server_packets" lineno="61558"> <summary> Send pgpkeyserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="61577"> <summary> Do not audit attempts to send pgpkeyserver_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pgpkeyserver_server_packets" lineno="61596"> <summary> Receive pgpkeyserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="61615"> <summary> Do not audit attempts to receive pgpkeyserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="61634"> <summary> Send and receive pgpkeyserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="61650"> <summary> Do not audit attempts to send and receive pgpkeyserver_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="61665"> <summary> Relabel packets to pgpkeyserver_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pingd_port" lineno="61687"> <summary> Send and receive TCP traffic on the pingd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pingd_port" lineno="61706"> <summary> Send UDP traffic on the pingd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pingd_port" lineno="61725"> <summary> Do not audit attempts to send UDP traffic on the pingd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pingd_port" lineno="61744"> <summary> Receive UDP traffic on the pingd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="61763"> <summary> Do not audit attempts to receive UDP traffic on the pingd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pingd_port" lineno="61782"> <summary> Send and receive UDP traffic on the pingd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="61799"> <summary> Do not audit attempts to send and receive UDP traffic on the pingd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pingd_port" lineno="61815"> <summary> Bind TCP sockets to the pingd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pingd_port" lineno="61835"> <summary> Bind UDP sockets to the pingd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pingd_port" lineno="61854"> <summary> Make a TCP connection to the pingd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pingd_client_packets" lineno="61874"> <summary> Send pingd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pingd_client_packets" lineno="61893"> <summary> Do not audit attempts to send pingd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pingd_client_packets" lineno="61912"> <summary> Receive pingd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="61931"> <summary> Do not audit attempts to receive pingd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pingd_client_packets" lineno="61950"> <summary> Send and receive pingd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="61966"> <summary> Do not audit attempts to send and receive pingd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pingd_client_packets" lineno="61981"> <summary> Relabel packets to pingd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pingd_server_packets" lineno="62001"> <summary> Send pingd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pingd_server_packets" lineno="62020"> <summary> Do not audit attempts to send pingd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pingd_server_packets" lineno="62039"> <summary> Receive pingd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="62058"> <summary> Do not audit attempts to receive pingd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pingd_server_packets" lineno="62077"> <summary> Send and receive pingd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="62093"> <summary> Do not audit attempts to send and receive pingd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pingd_server_packets" lineno="62108"> <summary> Relabel packets to pingd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_piranha_port" lineno="62130"> <summary> Send and receive TCP traffic on the piranha port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_piranha_port" lineno="62149"> <summary> Send UDP traffic on the piranha port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_piranha_port" lineno="62168"> <summary> Do not audit attempts to send UDP traffic on the piranha port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_piranha_port" lineno="62187"> <summary> Receive UDP traffic on the piranha port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_piranha_port" lineno="62206"> <summary> Do not audit attempts to receive UDP traffic on the piranha port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_piranha_port" lineno="62225"> <summary> Send and receive UDP traffic on the piranha port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_piranha_port" lineno="62242"> <summary> Do not audit attempts to send and receive UDP traffic on the piranha port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_piranha_port" lineno="62258"> <summary> Bind TCP sockets to the piranha port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_piranha_port" lineno="62278"> <summary> Bind UDP sockets to the piranha port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_piranha_port" lineno="62297"> <summary> Make a TCP connection to the piranha port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_piranha_client_packets" lineno="62317"> <summary> Send piranha_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_piranha_client_packets" lineno="62336"> <summary> Do not audit attempts to send piranha_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_piranha_client_packets" lineno="62355"> <summary> Receive piranha_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_piranha_client_packets" lineno="62374"> <summary> Do not audit attempts to receive piranha_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_piranha_client_packets" lineno="62393"> <summary> Send and receive piranha_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_piranha_client_packets" lineno="62409"> <summary> Do not audit attempts to send and receive piranha_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_piranha_client_packets" lineno="62424"> <summary> Relabel packets to piranha_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_piranha_server_packets" lineno="62444"> <summary> Send piranha_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_piranha_server_packets" lineno="62463"> <summary> Do not audit attempts to send piranha_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_piranha_server_packets" lineno="62482"> <summary> Receive piranha_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_piranha_server_packets" lineno="62501"> <summary> Do not audit attempts to receive piranha_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_piranha_server_packets" lineno="62520"> <summary> Send and receive piranha_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_piranha_server_packets" lineno="62536"> <summary> Do not audit attempts to send and receive piranha_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_piranha_server_packets" lineno="62551"> <summary> Relabel packets to piranha_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pki_ca_port" lineno="62573"> <summary> Send and receive TCP traffic on the pki_ca port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pki_ca_port" lineno="62592"> <summary> Send UDP traffic on the pki_ca port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pki_ca_port" lineno="62611"> <summary> Do not audit attempts to send UDP traffic on the pki_ca port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pki_ca_port" lineno="62630"> <summary> Receive UDP traffic on the pki_ca port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pki_ca_port" lineno="62649"> <summary> Do not audit attempts to receive UDP traffic on the pki_ca port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pki_ca_port" lineno="62668"> <summary> Send and receive UDP traffic on the pki_ca port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pki_ca_port" lineno="62685"> <summary> Do not audit attempts to send and receive UDP traffic on the pki_ca port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pki_ca_port" lineno="62701"> <summary> Bind TCP sockets to the pki_ca port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pki_ca_port" lineno="62721"> <summary> Bind UDP sockets to the pki_ca port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pki_ca_port" lineno="62740"> <summary> Make a TCP connection to the pki_ca port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_ca_client_packets" lineno="62760"> <summary> Send pki_ca_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_ca_client_packets" lineno="62779"> <summary> Do not audit attempts to send pki_ca_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_ca_client_packets" lineno="62798"> <summary> Receive pki_ca_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_ca_client_packets" lineno="62817"> <summary> Do not audit attempts to receive pki_ca_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_ca_client_packets" lineno="62836"> <summary> Send and receive pki_ca_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_ca_client_packets" lineno="62852"> <summary> Do not audit attempts to send and receive pki_ca_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_ca_client_packets" lineno="62867"> <summary> Relabel packets to pki_ca_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_ca_server_packets" lineno="62887"> <summary> Send pki_ca_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_ca_server_packets" lineno="62906"> <summary> Do not audit attempts to send pki_ca_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_ca_server_packets" lineno="62925"> <summary> Receive pki_ca_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_ca_server_packets" lineno="62944"> <summary> Do not audit attempts to receive pki_ca_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_ca_server_packets" lineno="62963"> <summary> Send and receive pki_ca_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_ca_server_packets" lineno="62979"> <summary> Do not audit attempts to send and receive pki_ca_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_ca_server_packets" lineno="62994"> <summary> Relabel packets to pki_ca_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pki_kra_port" lineno="63016"> <summary> Send and receive TCP traffic on the pki_kra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pki_kra_port" lineno="63035"> <summary> Send UDP traffic on the pki_kra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pki_kra_port" lineno="63054"> <summary> Do not audit attempts to send UDP traffic on the pki_kra port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pki_kra_port" lineno="63073"> <summary> Receive UDP traffic on the pki_kra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pki_kra_port" lineno="63092"> <summary> Do not audit attempts to receive UDP traffic on the pki_kra port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pki_kra_port" lineno="63111"> <summary> Send and receive UDP traffic on the pki_kra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pki_kra_port" lineno="63128"> <summary> Do not audit attempts to send and receive UDP traffic on the pki_kra port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pki_kra_port" lineno="63144"> <summary> Bind TCP sockets to the pki_kra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pki_kra_port" lineno="63164"> <summary> Bind UDP sockets to the pki_kra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pki_kra_port" lineno="63183"> <summary> Make a TCP connection to the pki_kra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_kra_client_packets" lineno="63203"> <summary> Send pki_kra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_kra_client_packets" lineno="63222"> <summary> Do not audit attempts to send pki_kra_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_kra_client_packets" lineno="63241"> <summary> Receive pki_kra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_kra_client_packets" lineno="63260"> <summary> Do not audit attempts to receive pki_kra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_kra_client_packets" lineno="63279"> <summary> Send and receive pki_kra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_kra_client_packets" lineno="63295"> <summary> Do not audit attempts to send and receive pki_kra_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_kra_client_packets" lineno="63310"> <summary> Relabel packets to pki_kra_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_kra_server_packets" lineno="63330"> <summary> Send pki_kra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_kra_server_packets" lineno="63349"> <summary> Do not audit attempts to send pki_kra_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_kra_server_packets" lineno="63368"> <summary> Receive pki_kra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_kra_server_packets" lineno="63387"> <summary> Do not audit attempts to receive pki_kra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_kra_server_packets" lineno="63406"> <summary> Send and receive pki_kra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_kra_server_packets" lineno="63422"> <summary> Do not audit attempts to send and receive pki_kra_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_kra_server_packets" lineno="63437"> <summary> Relabel packets to pki_kra_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pki_ocsp_port" lineno="63459"> <summary> Send and receive TCP traffic on the pki_ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pki_ocsp_port" lineno="63478"> <summary> Send UDP traffic on the pki_ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pki_ocsp_port" lineno="63497"> <summary> Do not audit attempts to send UDP traffic on the pki_ocsp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pki_ocsp_port" lineno="63516"> <summary> Receive UDP traffic on the pki_ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pki_ocsp_port" lineno="63535"> <summary> Do not audit attempts to receive UDP traffic on the pki_ocsp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pki_ocsp_port" lineno="63554"> <summary> Send and receive UDP traffic on the pki_ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pki_ocsp_port" lineno="63571"> <summary> Do not audit attempts to send and receive UDP traffic on the pki_ocsp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pki_ocsp_port" lineno="63587"> <summary> Bind TCP sockets to the pki_ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pki_ocsp_port" lineno="63607"> <summary> Bind UDP sockets to the pki_ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pki_ocsp_port" lineno="63626"> <summary> Make a TCP connection to the pki_ocsp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_ocsp_client_packets" lineno="63646"> <summary> Send pki_ocsp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_ocsp_client_packets" lineno="63665"> <summary> Do not audit attempts to send pki_ocsp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_ocsp_client_packets" lineno="63684"> <summary> Receive pki_ocsp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_ocsp_client_packets" lineno="63703"> <summary> Do not audit attempts to receive pki_ocsp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_ocsp_client_packets" lineno="63722"> <summary> Send and receive pki_ocsp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_ocsp_client_packets" lineno="63738"> <summary> Do not audit attempts to send and receive pki_ocsp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_ocsp_client_packets" lineno="63753"> <summary> Relabel packets to pki_ocsp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_ocsp_server_packets" lineno="63773"> <summary> Send pki_ocsp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_ocsp_server_packets" lineno="63792"> <summary> Do not audit attempts to send pki_ocsp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_ocsp_server_packets" lineno="63811"> <summary> Receive pki_ocsp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_ocsp_server_packets" lineno="63830"> <summary> Do not audit attempts to receive pki_ocsp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_ocsp_server_packets" lineno="63849"> <summary> Send and receive pki_ocsp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_ocsp_server_packets" lineno="63865"> <summary> Do not audit attempts to send and receive pki_ocsp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_ocsp_server_packets" lineno="63880"> <summary> Relabel packets to pki_ocsp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pki_tks_port" lineno="63902"> <summary> Send and receive TCP traffic on the pki_tks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pki_tks_port" lineno="63921"> <summary> Send UDP traffic on the pki_tks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pki_tks_port" lineno="63940"> <summary> Do not audit attempts to send UDP traffic on the pki_tks port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pki_tks_port" lineno="63959"> <summary> Receive UDP traffic on the pki_tks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pki_tks_port" lineno="63978"> <summary> Do not audit attempts to receive UDP traffic on the pki_tks port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pki_tks_port" lineno="63997"> <summary> Send and receive UDP traffic on the pki_tks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pki_tks_port" lineno="64014"> <summary> Do not audit attempts to send and receive UDP traffic on the pki_tks port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pki_tks_port" lineno="64030"> <summary> Bind TCP sockets to the pki_tks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pki_tks_port" lineno="64050"> <summary> Bind UDP sockets to the pki_tks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pki_tks_port" lineno="64069"> <summary> Make a TCP connection to the pki_tks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_tks_client_packets" lineno="64089"> <summary> Send pki_tks_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_tks_client_packets" lineno="64108"> <summary> Do not audit attempts to send pki_tks_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_tks_client_packets" lineno="64127"> <summary> Receive pki_tks_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_tks_client_packets" lineno="64146"> <summary> Do not audit attempts to receive pki_tks_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_tks_client_packets" lineno="64165"> <summary> Send and receive pki_tks_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_tks_client_packets" lineno="64181"> <summary> Do not audit attempts to send and receive pki_tks_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_tks_client_packets" lineno="64196"> <summary> Relabel packets to pki_tks_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_tks_server_packets" lineno="64216"> <summary> Send pki_tks_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_tks_server_packets" lineno="64235"> <summary> Do not audit attempts to send pki_tks_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_tks_server_packets" lineno="64254"> <summary> Receive pki_tks_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_tks_server_packets" lineno="64273"> <summary> Do not audit attempts to receive pki_tks_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_tks_server_packets" lineno="64292"> <summary> Send and receive pki_tks_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_tks_server_packets" lineno="64308"> <summary> Do not audit attempts to send and receive pki_tks_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_tks_server_packets" lineno="64323"> <summary> Relabel packets to pki_tks_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pki_ra_port" lineno="64345"> <summary> Send and receive TCP traffic on the pki_ra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pki_ra_port" lineno="64364"> <summary> Send UDP traffic on the pki_ra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pki_ra_port" lineno="64383"> <summary> Do not audit attempts to send UDP traffic on the pki_ra port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pki_ra_port" lineno="64402"> <summary> Receive UDP traffic on the pki_ra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pki_ra_port" lineno="64421"> <summary> Do not audit attempts to receive UDP traffic on the pki_ra port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pki_ra_port" lineno="64440"> <summary> Send and receive UDP traffic on the pki_ra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pki_ra_port" lineno="64457"> <summary> Do not audit attempts to send and receive UDP traffic on the pki_ra port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pki_ra_port" lineno="64473"> <summary> Bind TCP sockets to the pki_ra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pki_ra_port" lineno="64493"> <summary> Bind UDP sockets to the pki_ra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pki_ra_port" lineno="64512"> <summary> Make a TCP connection to the pki_ra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_ra_client_packets" lineno="64532"> <summary> Send pki_ra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_ra_client_packets" lineno="64551"> <summary> Do not audit attempts to send pki_ra_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_ra_client_packets" lineno="64570"> <summary> Receive pki_ra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_ra_client_packets" lineno="64589"> <summary> Do not audit attempts to receive pki_ra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_ra_client_packets" lineno="64608"> <summary> Send and receive pki_ra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_ra_client_packets" lineno="64624"> <summary> Do not audit attempts to send and receive pki_ra_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_ra_client_packets" lineno="64639"> <summary> Relabel packets to pki_ra_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_ra_server_packets" lineno="64659"> <summary> Send pki_ra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_ra_server_packets" lineno="64678"> <summary> Do not audit attempts to send pki_ra_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_ra_server_packets" lineno="64697"> <summary> Receive pki_ra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_ra_server_packets" lineno="64716"> <summary> Do not audit attempts to receive pki_ra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_ra_server_packets" lineno="64735"> <summary> Send and receive pki_ra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_ra_server_packets" lineno="64751"> <summary> Do not audit attempts to send and receive pki_ra_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_ra_server_packets" lineno="64766"> <summary> Relabel packets to pki_ra_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pki_tps_port" lineno="64788"> <summary> Send and receive TCP traffic on the pki_tps port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pki_tps_port" lineno="64807"> <summary> Send UDP traffic on the pki_tps port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pki_tps_port" lineno="64826"> <summary> Do not audit attempts to send UDP traffic on the pki_tps port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pki_tps_port" lineno="64845"> <summary> Receive UDP traffic on the pki_tps port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pki_tps_port" lineno="64864"> <summary> Do not audit attempts to receive UDP traffic on the pki_tps port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pki_tps_port" lineno="64883"> <summary> Send and receive UDP traffic on the pki_tps port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pki_tps_port" lineno="64900"> <summary> Do not audit attempts to send and receive UDP traffic on the pki_tps port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pki_tps_port" lineno="64916"> <summary> Bind TCP sockets to the pki_tps port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pki_tps_port" lineno="64936"> <summary> Bind UDP sockets to the pki_tps port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pki_tps_port" lineno="64955"> <summary> Make a TCP connection to the pki_tps port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_tps_client_packets" lineno="64975"> <summary> Send pki_tps_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_tps_client_packets" lineno="64994"> <summary> Do not audit attempts to send pki_tps_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_tps_client_packets" lineno="65013"> <summary> Receive pki_tps_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_tps_client_packets" lineno="65032"> <summary> Do not audit attempts to receive pki_tps_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_tps_client_packets" lineno="65051"> <summary> Send and receive pki_tps_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_tps_client_packets" lineno="65067"> <summary> Do not audit attempts to send and receive pki_tps_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_tps_client_packets" lineno="65082"> <summary> Relabel packets to pki_tps_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pki_tps_server_packets" lineno="65102"> <summary> Send pki_tps_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pki_tps_server_packets" lineno="65121"> <summary> Do not audit attempts to send pki_tps_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pki_tps_server_packets" lineno="65140"> <summary> Receive pki_tps_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pki_tps_server_packets" lineno="65159"> <summary> Do not audit attempts to receive pki_tps_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pki_tps_server_packets" lineno="65178"> <summary> Send and receive pki_tps_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pki_tps_server_packets" lineno="65194"> <summary> Do not audit attempts to send and receive pki_tps_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pki_tps_server_packets" lineno="65209"> <summary> Relabel packets to pki_tps_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pop_port" lineno="65231"> <summary> Send and receive TCP traffic on the pop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pop_port" lineno="65250"> <summary> Send UDP traffic on the pop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pop_port" lineno="65269"> <summary> Do not audit attempts to send UDP traffic on the pop port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pop_port" lineno="65288"> <summary> Receive UDP traffic on the pop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pop_port" lineno="65307"> <summary> Do not audit attempts to receive UDP traffic on the pop port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pop_port" lineno="65326"> <summary> Send and receive UDP traffic on the pop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="65343"> <summary> Do not audit attempts to send and receive UDP traffic on the pop port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pop_port" lineno="65359"> <summary> Bind TCP sockets to the pop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pop_port" lineno="65379"> <summary> Bind UDP sockets to the pop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pop_port" lineno="65398"> <summary> Make a TCP connection to the pop port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pop_client_packets" lineno="65418"> <summary> Send pop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pop_client_packets" lineno="65437"> <summary> Do not audit attempts to send pop_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pop_client_packets" lineno="65456"> <summary> Receive pop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pop_client_packets" lineno="65475"> <summary> Do not audit attempts to receive pop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pop_client_packets" lineno="65494"> <summary> Send and receive pop_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="65510"> <summary> Do not audit attempts to send and receive pop_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pop_client_packets" lineno="65525"> <summary> Relabel packets to pop_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pop_server_packets" lineno="65545"> <summary> Send pop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pop_server_packets" lineno="65564"> <summary> Do not audit attempts to send pop_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pop_server_packets" lineno="65583"> <summary> Receive pop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pop_server_packets" lineno="65602"> <summary> Do not audit attempts to receive pop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pop_server_packets" lineno="65621"> <summary> Send and receive pop_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="65637"> <summary> Do not audit attempts to send and receive pop_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pop_server_packets" lineno="65652"> <summary> Relabel packets to pop_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_portmap_port" lineno="65674"> <summary> Send and receive TCP traffic on the portmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_portmap_port" lineno="65693"> <summary> Send UDP traffic on the portmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_portmap_port" lineno="65712"> <summary> Do not audit attempts to send UDP traffic on the portmap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_portmap_port" lineno="65731"> <summary> Receive UDP traffic on the portmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="65750"> <summary> Do not audit attempts to receive UDP traffic on the portmap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_portmap_port" lineno="65769"> <summary> Send and receive UDP traffic on the portmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="65786"> <summary> Do not audit attempts to send and receive UDP traffic on the portmap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_portmap_port" lineno="65802"> <summary> Bind TCP sockets to the portmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_portmap_port" lineno="65822"> <summary> Bind UDP sockets to the portmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_portmap_port" lineno="65841"> <summary> Make a TCP connection to the portmap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_portmap_client_packets" lineno="65861"> <summary> Send portmap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_portmap_client_packets" lineno="65880"> <summary> Do not audit attempts to send portmap_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_portmap_client_packets" lineno="65899"> <summary> Receive portmap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="65918"> <summary> Do not audit attempts to receive portmap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_portmap_client_packets" lineno="65937"> <summary> Send and receive portmap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="65953"> <summary> Do not audit attempts to send and receive portmap_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_portmap_client_packets" lineno="65968"> <summary> Relabel packets to portmap_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_portmap_server_packets" lineno="65988"> <summary> Send portmap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_portmap_server_packets" lineno="66007"> <summary> Do not audit attempts to send portmap_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_portmap_server_packets" lineno="66026"> <summary> Receive portmap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="66045"> <summary> Do not audit attempts to receive portmap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_portmap_server_packets" lineno="66064"> <summary> Send and receive portmap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="66080"> <summary> Do not audit attempts to send and receive portmap_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_portmap_server_packets" lineno="66095"> <summary> Relabel packets to portmap_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="66117"> <summary> Send and receive TCP traffic on the postfix_policyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_postfix_policyd_port" lineno="66136"> <summary> Send UDP traffic on the postfix_policyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="66155"> <summary> Do not audit attempts to send UDP traffic on the postfix_policyd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_postfix_policyd_port" lineno="66174"> <summary> Receive UDP traffic on the postfix_policyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="66193"> <summary> Do not audit attempts to receive UDP traffic on the postfix_policyd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="66212"> <summary> Send and receive UDP traffic on the postfix_policyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="66229"> <summary> Do not audit attempts to send and receive UDP traffic on the postfix_policyd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_postfix_policyd_port" lineno="66245"> <summary> Bind TCP sockets to the postfix_policyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_postfix_policyd_port" lineno="66265"> <summary> Bind UDP sockets to the postfix_policyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_postfix_policyd_port" lineno="66284"> <summary> Make a TCP connection to the postfix_policyd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_postfix_policyd_client_packets" lineno="66304"> <summary> Send postfix_policyd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="66323"> <summary> Do not audit attempts to send postfix_policyd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_postfix_policyd_client_packets" lineno="66342"> <summary> Receive postfix_policyd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="66361"> <summary> Do not audit attempts to receive postfix_policyd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="66380"> <summary> Send and receive postfix_policyd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="66396"> <summary> Do not audit attempts to send and receive postfix_policyd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="66411"> <summary> Relabel packets to postfix_policyd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_postfix_policyd_server_packets" lineno="66431"> <summary> Send postfix_policyd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="66450"> <summary> Do not audit attempts to send postfix_policyd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_postfix_policyd_server_packets" lineno="66469"> <summary> Receive postfix_policyd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="66488"> <summary> Do not audit attempts to receive postfix_policyd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="66507"> <summary> Send and receive postfix_policyd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="66523"> <summary> Do not audit attempts to send and receive postfix_policyd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="66538"> <summary> Relabel packets to postfix_policyd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_postgresql_port" lineno="66560"> <summary> Send and receive TCP traffic on the postgresql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_postgresql_port" lineno="66579"> <summary> Send UDP traffic on the postgresql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="66598"> <summary> Do not audit attempts to send UDP traffic on the postgresql port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_postgresql_port" lineno="66617"> <summary> Receive UDP traffic on the postgresql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="66636"> <summary> Do not audit attempts to receive UDP traffic on the postgresql port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_postgresql_port" lineno="66655"> <summary> Send and receive UDP traffic on the postgresql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="66672"> <summary> Do not audit attempts to send and receive UDP traffic on the postgresql port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_postgresql_port" lineno="66688"> <summary> Bind TCP sockets to the postgresql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_postgresql_port" lineno="66708"> <summary> Bind UDP sockets to the postgresql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_postgresql_port" lineno="66727"> <summary> Make a TCP connection to the postgresql port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_postgresql_client_packets" lineno="66747"> <summary> Send postgresql_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="66766"> <summary> Do not audit attempts to send postgresql_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_postgresql_client_packets" lineno="66785"> <summary> Receive postgresql_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="66804"> <summary> Do not audit attempts to receive postgresql_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_postgresql_client_packets" lineno="66823"> <summary> Send and receive postgresql_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="66839"> <summary> Do not audit attempts to send and receive postgresql_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_postgresql_client_packets" lineno="66854"> <summary> Relabel packets to postgresql_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_postgresql_server_packets" lineno="66874"> <summary> Send postgresql_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="66893"> <summary> Do not audit attempts to send postgresql_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_postgresql_server_packets" lineno="66912"> <summary> Receive postgresql_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="66931"> <summary> Do not audit attempts to receive postgresql_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_postgresql_server_packets" lineno="66950"> <summary> Send and receive postgresql_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="66966"> <summary> Do not audit attempts to send and receive postgresql_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_postgresql_server_packets" lineno="66981"> <summary> Relabel packets to postgresql_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_postgrey_port" lineno="67003"> <summary> Send and receive TCP traffic on the postgrey port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_postgrey_port" lineno="67022"> <summary> Send UDP traffic on the postgrey port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="67041"> <summary> Do not audit attempts to send UDP traffic on the postgrey port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_postgrey_port" lineno="67060"> <summary> Receive UDP traffic on the postgrey port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="67079"> <summary> Do not audit attempts to receive UDP traffic on the postgrey port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_postgrey_port" lineno="67098"> <summary> Send and receive UDP traffic on the postgrey port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="67115"> <summary> Do not audit attempts to send and receive UDP traffic on the postgrey port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_postgrey_port" lineno="67131"> <summary> Bind TCP sockets to the postgrey port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_postgrey_port" lineno="67151"> <summary> Bind UDP sockets to the postgrey port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_postgrey_port" lineno="67170"> <summary> Make a TCP connection to the postgrey port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_postgrey_client_packets" lineno="67190"> <summary> Send postgrey_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="67209"> <summary> Do not audit attempts to send postgrey_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_postgrey_client_packets" lineno="67228"> <summary> Receive postgrey_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="67247"> <summary> Do not audit attempts to receive postgrey_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_postgrey_client_packets" lineno="67266"> <summary> Send and receive postgrey_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="67282"> <summary> Do not audit attempts to send and receive postgrey_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_postgrey_client_packets" lineno="67297"> <summary> Relabel packets to postgrey_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_postgrey_server_packets" lineno="67317"> <summary> Send postgrey_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="67336"> <summary> Do not audit attempts to send postgrey_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_postgrey_server_packets" lineno="67355"> <summary> Receive postgrey_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="67374"> <summary> Do not audit attempts to receive postgrey_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_postgrey_server_packets" lineno="67393"> <summary> Send and receive postgrey_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="67409"> <summary> Do not audit attempts to send and receive postgrey_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_postgrey_server_packets" lineno="67424"> <summary> Relabel packets to postgrey_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_prelude_port" lineno="67446"> <summary> Send and receive TCP traffic on the prelude port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_prelude_port" lineno="67465"> <summary> Send UDP traffic on the prelude port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_prelude_port" lineno="67484"> <summary> Do not audit attempts to send UDP traffic on the prelude port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_prelude_port" lineno="67503"> <summary> Receive UDP traffic on the prelude port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="67522"> <summary> Do not audit attempts to receive UDP traffic on the prelude port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_prelude_port" lineno="67541"> <summary> Send and receive UDP traffic on the prelude port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="67558"> <summary> Do not audit attempts to send and receive UDP traffic on the prelude port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_prelude_port" lineno="67574"> <summary> Bind TCP sockets to the prelude port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_prelude_port" lineno="67594"> <summary> Bind UDP sockets to the prelude port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_prelude_port" lineno="67613"> <summary> Make a TCP connection to the prelude port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_prelude_client_packets" lineno="67633"> <summary> Send prelude_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_prelude_client_packets" lineno="67652"> <summary> Do not audit attempts to send prelude_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_prelude_client_packets" lineno="67671"> <summary> Receive prelude_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="67690"> <summary> Do not audit attempts to receive prelude_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_prelude_client_packets" lineno="67709"> <summary> Send and receive prelude_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="67725"> <summary> Do not audit attempts to send and receive prelude_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_prelude_client_packets" lineno="67740"> <summary> Relabel packets to prelude_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_prelude_server_packets" lineno="67760"> <summary> Send prelude_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_prelude_server_packets" lineno="67779"> <summary> Do not audit attempts to send prelude_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_prelude_server_packets" lineno="67798"> <summary> Receive prelude_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="67817"> <summary> Do not audit attempts to receive prelude_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_prelude_server_packets" lineno="67836"> <summary> Send and receive prelude_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="67852"> <summary> Do not audit attempts to send and receive prelude_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_prelude_server_packets" lineno="67867"> <summary> Relabel packets to prelude_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_presence_port" lineno="67889"> <summary> Send and receive TCP traffic on the presence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_presence_port" lineno="67908"> <summary> Send UDP traffic on the presence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_presence_port" lineno="67927"> <summary> Do not audit attempts to send UDP traffic on the presence port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_presence_port" lineno="67946"> <summary> Receive UDP traffic on the presence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_presence_port" lineno="67965"> <summary> Do not audit attempts to receive UDP traffic on the presence port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_presence_port" lineno="67984"> <summary> Send and receive UDP traffic on the presence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="68001"> <summary> Do not audit attempts to send and receive UDP traffic on the presence port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_presence_port" lineno="68017"> <summary> Bind TCP sockets to the presence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_presence_port" lineno="68037"> <summary> Bind UDP sockets to the presence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_presence_port" lineno="68056"> <summary> Make a TCP connection to the presence port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_presence_client_packets" lineno="68076"> <summary> Send presence_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_presence_client_packets" lineno="68095"> <summary> Do not audit attempts to send presence_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_presence_client_packets" lineno="68114"> <summary> Receive presence_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_presence_client_packets" lineno="68133"> <summary> Do not audit attempts to receive presence_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_presence_client_packets" lineno="68152"> <summary> Send and receive presence_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="68168"> <summary> Do not audit attempts to send and receive presence_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_presence_client_packets" lineno="68183"> <summary> Relabel packets to presence_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_presence_server_packets" lineno="68203"> <summary> Send presence_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_presence_server_packets" lineno="68222"> <summary> Do not audit attempts to send presence_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_presence_server_packets" lineno="68241"> <summary> Receive presence_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_presence_server_packets" lineno="68260"> <summary> Do not audit attempts to receive presence_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_presence_server_packets" lineno="68279"> <summary> Send and receive presence_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="68295"> <summary> Do not audit attempts to send and receive presence_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_presence_server_packets" lineno="68310"> <summary> Relabel packets to presence_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_preupgrade_port" lineno="68332"> <summary> Send and receive TCP traffic on the preupgrade port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_preupgrade_port" lineno="68351"> <summary> Send UDP traffic on the preupgrade port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_preupgrade_port" lineno="68370"> <summary> Do not audit attempts to send UDP traffic on the preupgrade port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_preupgrade_port" lineno="68389"> <summary> Receive UDP traffic on the preupgrade port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_preupgrade_port" lineno="68408"> <summary> Do not audit attempts to receive UDP traffic on the preupgrade port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_preupgrade_port" lineno="68427"> <summary> Send and receive UDP traffic on the preupgrade port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_preupgrade_port" lineno="68444"> <summary> Do not audit attempts to send and receive UDP traffic on the preupgrade port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_preupgrade_port" lineno="68460"> <summary> Bind TCP sockets to the preupgrade port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_preupgrade_port" lineno="68480"> <summary> Bind UDP sockets to the preupgrade port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_preupgrade_port" lineno="68499"> <summary> Make a TCP connection to the preupgrade port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_preupgrade_client_packets" lineno="68519"> <summary> Send preupgrade_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_preupgrade_client_packets" lineno="68538"> <summary> Do not audit attempts to send preupgrade_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_preupgrade_client_packets" lineno="68557"> <summary> Receive preupgrade_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_preupgrade_client_packets" lineno="68576"> <summary> Do not audit attempts to receive preupgrade_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_preupgrade_client_packets" lineno="68595"> <summary> Send and receive preupgrade_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_preupgrade_client_packets" lineno="68611"> <summary> Do not audit attempts to send and receive preupgrade_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_preupgrade_client_packets" lineno="68626"> <summary> Relabel packets to preupgrade_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_preupgrade_server_packets" lineno="68646"> <summary> Send preupgrade_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_preupgrade_server_packets" lineno="68665"> <summary> Do not audit attempts to send preupgrade_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_preupgrade_server_packets" lineno="68684"> <summary> Receive preupgrade_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_preupgrade_server_packets" lineno="68703"> <summary> Do not audit attempts to receive preupgrade_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_preupgrade_server_packets" lineno="68722"> <summary> Send and receive preupgrade_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_preupgrade_server_packets" lineno="68738"> <summary> Do not audit attempts to send and receive preupgrade_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_preupgrade_server_packets" lineno="68753"> <summary> Relabel packets to preupgrade_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_printer_port" lineno="68775"> <summary> Send and receive TCP traffic on the printer port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_printer_port" lineno="68794"> <summary> Send UDP traffic on the printer port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_printer_port" lineno="68813"> <summary> Do not audit attempts to send UDP traffic on the printer port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_printer_port" lineno="68832"> <summary> Receive UDP traffic on the printer port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_printer_port" lineno="68851"> <summary> Do not audit attempts to receive UDP traffic on the printer port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_printer_port" lineno="68870"> <summary> Send and receive UDP traffic on the printer port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="68887"> <summary> Do not audit attempts to send and receive UDP traffic on the printer port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_printer_port" lineno="68903"> <summary> Bind TCP sockets to the printer port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_printer_port" lineno="68923"> <summary> Bind UDP sockets to the printer port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_printer_port" lineno="68942"> <summary> Make a TCP connection to the printer port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_printer_client_packets" lineno="68962"> <summary> Send printer_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_printer_client_packets" lineno="68981"> <summary> Do not audit attempts to send printer_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_printer_client_packets" lineno="69000"> <summary> Receive printer_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_printer_client_packets" lineno="69019"> <summary> Do not audit attempts to receive printer_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_printer_client_packets" lineno="69038"> <summary> Send and receive printer_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="69054"> <summary> Do not audit attempts to send and receive printer_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_printer_client_packets" lineno="69069"> <summary> Relabel packets to printer_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_printer_server_packets" lineno="69089"> <summary> Send printer_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_printer_server_packets" lineno="69108"> <summary> Do not audit attempts to send printer_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_printer_server_packets" lineno="69127"> <summary> Receive printer_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_printer_server_packets" lineno="69146"> <summary> Do not audit attempts to receive printer_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_printer_server_packets" lineno="69165"> <summary> Send and receive printer_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="69181"> <summary> Do not audit attempts to send and receive printer_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_printer_server_packets" lineno="69196"> <summary> Relabel packets to printer_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ptal_port" lineno="69218"> <summary> Send and receive TCP traffic on the ptal port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ptal_port" lineno="69237"> <summary> Send UDP traffic on the ptal port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ptal_port" lineno="69256"> <summary> Do not audit attempts to send UDP traffic on the ptal port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ptal_port" lineno="69275"> <summary> Receive UDP traffic on the ptal port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="69294"> <summary> Do not audit attempts to receive UDP traffic on the ptal port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ptal_port" lineno="69313"> <summary> Send and receive UDP traffic on the ptal port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="69330"> <summary> Do not audit attempts to send and receive UDP traffic on the ptal port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ptal_port" lineno="69346"> <summary> Bind TCP sockets to the ptal port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ptal_port" lineno="69366"> <summary> Bind UDP sockets to the ptal port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ptal_port" lineno="69385"> <summary> Make a TCP connection to the ptal port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ptal_client_packets" lineno="69405"> <summary> Send ptal_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ptal_client_packets" lineno="69424"> <summary> Do not audit attempts to send ptal_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ptal_client_packets" lineno="69443"> <summary> Receive ptal_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="69462"> <summary> Do not audit attempts to receive ptal_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ptal_client_packets" lineno="69481"> <summary> Send and receive ptal_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="69497"> <summary> Do not audit attempts to send and receive ptal_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ptal_client_packets" lineno="69512"> <summary> Relabel packets to ptal_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ptal_server_packets" lineno="69532"> <summary> Send ptal_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ptal_server_packets" lineno="69551"> <summary> Do not audit attempts to send ptal_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ptal_server_packets" lineno="69570"> <summary> Receive ptal_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="69589"> <summary> Do not audit attempts to receive ptal_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ptal_server_packets" lineno="69608"> <summary> Send and receive ptal_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="69624"> <summary> Do not audit attempts to send and receive ptal_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ptal_server_packets" lineno="69639"> <summary> Relabel packets to ptal_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="69661"> <summary> Send and receive TCP traffic on the pulseaudio port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pulseaudio_port" lineno="69680"> <summary> Send UDP traffic on the pulseaudio port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="69699"> <summary> Do not audit attempts to send UDP traffic on the pulseaudio port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pulseaudio_port" lineno="69718"> <summary> Receive UDP traffic on the pulseaudio port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="69737"> <summary> Do not audit attempts to receive UDP traffic on the pulseaudio port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="69756"> <summary> Send and receive UDP traffic on the pulseaudio port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="69773"> <summary> Do not audit attempts to send and receive UDP traffic on the pulseaudio port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pulseaudio_port" lineno="69789"> <summary> Bind TCP sockets to the pulseaudio port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pulseaudio_port" lineno="69809"> <summary> Bind UDP sockets to the pulseaudio port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pulseaudio_port" lineno="69828"> <summary> Make a TCP connection to the pulseaudio port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pulseaudio_client_packets" lineno="69848"> <summary> Send pulseaudio_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="69867"> <summary> Do not audit attempts to send pulseaudio_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pulseaudio_client_packets" lineno="69886"> <summary> Receive pulseaudio_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="69905"> <summary> Do not audit attempts to receive pulseaudio_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="69924"> <summary> Send and receive pulseaudio_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="69940"> <summary> Do not audit attempts to send and receive pulseaudio_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pulseaudio_client_packets" lineno="69955"> <summary> Relabel packets to pulseaudio_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pulseaudio_server_packets" lineno="69975"> <summary> Send pulseaudio_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="69994"> <summary> Do not audit attempts to send pulseaudio_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pulseaudio_server_packets" lineno="70013"> <summary> Receive pulseaudio_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="70032"> <summary> Do not audit attempts to receive pulseaudio_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="70051"> <summary> Send and receive pulseaudio_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="70067"> <summary> Do not audit attempts to send and receive pulseaudio_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pulseaudio_server_packets" lineno="70082"> <summary> Relabel packets to pulseaudio_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_puppet_port" lineno="70104"> <summary> Send and receive TCP traffic on the puppet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_puppet_port" lineno="70123"> <summary> Send UDP traffic on the puppet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_puppet_port" lineno="70142"> <summary> Do not audit attempts to send UDP traffic on the puppet port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_puppet_port" lineno="70161"> <summary> Receive UDP traffic on the puppet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="70180"> <summary> Do not audit attempts to receive UDP traffic on the puppet port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_puppet_port" lineno="70199"> <summary> Send and receive UDP traffic on the puppet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="70216"> <summary> Do not audit attempts to send and receive UDP traffic on the puppet port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_puppet_port" lineno="70232"> <summary> Bind TCP sockets to the puppet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_puppet_port" lineno="70252"> <summary> Bind UDP sockets to the puppet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_puppet_port" lineno="70271"> <summary> Make a TCP connection to the puppet port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_puppet_client_packets" lineno="70291"> <summary> Send puppet_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_puppet_client_packets" lineno="70310"> <summary> Do not audit attempts to send puppet_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_puppet_client_packets" lineno="70329"> <summary> Receive puppet_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="70348"> <summary> Do not audit attempts to receive puppet_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_puppet_client_packets" lineno="70367"> <summary> Send and receive puppet_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="70383"> <summary> Do not audit attempts to send and receive puppet_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_puppet_client_packets" lineno="70398"> <summary> Relabel packets to puppet_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_puppet_server_packets" lineno="70418"> <summary> Send puppet_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_puppet_server_packets" lineno="70437"> <summary> Do not audit attempts to send puppet_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_puppet_server_packets" lineno="70456"> <summary> Receive puppet_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="70475"> <summary> Do not audit attempts to receive puppet_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_puppet_server_packets" lineno="70494"> <summary> Send and receive puppet_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="70510"> <summary> Do not audit attempts to send and receive puppet_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_puppet_server_packets" lineno="70525"> <summary> Relabel packets to puppet_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pxe_port" lineno="70547"> <summary> Send and receive TCP traffic on the pxe port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pxe_port" lineno="70566"> <summary> Send UDP traffic on the pxe port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pxe_port" lineno="70585"> <summary> Do not audit attempts to send UDP traffic on the pxe port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pxe_port" lineno="70604"> <summary> Receive UDP traffic on the pxe port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="70623"> <summary> Do not audit attempts to receive UDP traffic on the pxe port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pxe_port" lineno="70642"> <summary> Send and receive UDP traffic on the pxe port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="70659"> <summary> Do not audit attempts to send and receive UDP traffic on the pxe port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pxe_port" lineno="70675"> <summary> Bind TCP sockets to the pxe port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pxe_port" lineno="70695"> <summary> Bind UDP sockets to the pxe port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pxe_port" lineno="70714"> <summary> Make a TCP connection to the pxe port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pxe_client_packets" lineno="70734"> <summary> Send pxe_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pxe_client_packets" lineno="70753"> <summary> Do not audit attempts to send pxe_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pxe_client_packets" lineno="70772"> <summary> Receive pxe_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="70791"> <summary> Do not audit attempts to receive pxe_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pxe_client_packets" lineno="70810"> <summary> Send and receive pxe_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="70826"> <summary> Do not audit attempts to send and receive pxe_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pxe_client_packets" lineno="70841"> <summary> Relabel packets to pxe_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pxe_server_packets" lineno="70861"> <summary> Send pxe_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pxe_server_packets" lineno="70880"> <summary> Do not audit attempts to send pxe_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pxe_server_packets" lineno="70899"> <summary> Receive pxe_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="70918"> <summary> Do not audit attempts to receive pxe_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pxe_server_packets" lineno="70937"> <summary> Send and receive pxe_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="70953"> <summary> Do not audit attempts to send and receive pxe_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pxe_server_packets" lineno="70968"> <summary> Relabel packets to pxe_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_pyzor_port" lineno="70990"> <summary> Send and receive TCP traffic on the pyzor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_pyzor_port" lineno="71009"> <summary> Send UDP traffic on the pyzor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="71028"> <summary> Do not audit attempts to send UDP traffic on the pyzor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_pyzor_port" lineno="71047"> <summary> Receive UDP traffic on the pyzor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="71066"> <summary> Do not audit attempts to receive UDP traffic on the pyzor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_pyzor_port" lineno="71085"> <summary> Send and receive UDP traffic on the pyzor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="71102"> <summary> Do not audit attempts to send and receive UDP traffic on the pyzor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_pyzor_port" lineno="71118"> <summary> Bind TCP sockets to the pyzor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_pyzor_port" lineno="71138"> <summary> Bind UDP sockets to the pyzor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_pyzor_port" lineno="71157"> <summary> Make a TCP connection to the pyzor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pyzor_client_packets" lineno="71177"> <summary> Send pyzor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="71196"> <summary> Do not audit attempts to send pyzor_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pyzor_client_packets" lineno="71215"> <summary> Receive pyzor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="71234"> <summary> Do not audit attempts to receive pyzor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pyzor_client_packets" lineno="71253"> <summary> Send and receive pyzor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="71269"> <summary> Do not audit attempts to send and receive pyzor_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pyzor_client_packets" lineno="71284"> <summary> Relabel packets to pyzor_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_pyzor_server_packets" lineno="71304"> <summary> Send pyzor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="71323"> <summary> Do not audit attempts to send pyzor_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_pyzor_server_packets" lineno="71342"> <summary> Receive pyzor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="71361"> <summary> Do not audit attempts to receive pyzor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_pyzor_server_packets" lineno="71380"> <summary> Send and receive pyzor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="71396"> <summary> Do not audit attempts to send and receive pyzor_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_pyzor_server_packets" lineno="71411"> <summary> Relabel packets to pyzor_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_neutron_port" lineno="71433"> <summary> Send and receive TCP traffic on the neutron port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_neutron_port" lineno="71452"> <summary> Send UDP traffic on the neutron port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_neutron_port" lineno="71471"> <summary> Do not audit attempts to send UDP traffic on the neutron port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_neutron_port" lineno="71490"> <summary> Receive UDP traffic on the neutron port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_neutron_port" lineno="71509"> <summary> Do not audit attempts to receive UDP traffic on the neutron port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_neutron_port" lineno="71528"> <summary> Send and receive UDP traffic on the neutron port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_neutron_port" lineno="71545"> <summary> Do not audit attempts to send and receive UDP traffic on the neutron port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_neutron_port" lineno="71561"> <summary> Bind TCP sockets to the neutron port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_neutron_port" lineno="71581"> <summary> Bind UDP sockets to the neutron port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_neutron_port" lineno="71600"> <summary> Make a TCP connection to the neutron port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_neutron_client_packets" lineno="71620"> <summary> Send neutron_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_neutron_client_packets" lineno="71639"> <summary> Do not audit attempts to send neutron_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_neutron_client_packets" lineno="71658"> <summary> Receive neutron_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_neutron_client_packets" lineno="71677"> <summary> Do not audit attempts to receive neutron_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_neutron_client_packets" lineno="71696"> <summary> Send and receive neutron_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_neutron_client_packets" lineno="71712"> <summary> Do not audit attempts to send and receive neutron_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_neutron_client_packets" lineno="71727"> <summary> Relabel packets to neutron_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_neutron_server_packets" lineno="71747"> <summary> Send neutron_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_neutron_server_packets" lineno="71766"> <summary> Do not audit attempts to send neutron_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_neutron_server_packets" lineno="71785"> <summary> Receive neutron_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_neutron_server_packets" lineno="71804"> <summary> Do not audit attempts to receive neutron_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_neutron_server_packets" lineno="71823"> <summary> Send and receive neutron_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_neutron_server_packets" lineno="71839"> <summary> Do not audit attempts to send and receive neutron_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_neutron_server_packets" lineno="71854"> <summary> Relabel packets to neutron_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_radacct_port" lineno="71876"> <summary> Send and receive TCP traffic on the radacct port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_radacct_port" lineno="71895"> <summary> Send UDP traffic on the radacct port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_radacct_port" lineno="71914"> <summary> Do not audit attempts to send UDP traffic on the radacct port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_radacct_port" lineno="71933"> <summary> Receive UDP traffic on the radacct port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="71952"> <summary> Do not audit attempts to receive UDP traffic on the radacct port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_radacct_port" lineno="71971"> <summary> Send and receive UDP traffic on the radacct port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="71988"> <summary> Do not audit attempts to send and receive UDP traffic on the radacct port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_radacct_port" lineno="72004"> <summary> Bind TCP sockets to the radacct port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_radacct_port" lineno="72024"> <summary> Bind UDP sockets to the radacct port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_radacct_port" lineno="72043"> <summary> Make a TCP connection to the radacct port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_radacct_client_packets" lineno="72063"> <summary> Send radacct_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_radacct_client_packets" lineno="72082"> <summary> Do not audit attempts to send radacct_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_radacct_client_packets" lineno="72101"> <summary> Receive radacct_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="72120"> <summary> Do not audit attempts to receive radacct_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_radacct_client_packets" lineno="72139"> <summary> Send and receive radacct_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="72155"> <summary> Do not audit attempts to send and receive radacct_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_radacct_client_packets" lineno="72170"> <summary> Relabel packets to radacct_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_radacct_server_packets" lineno="72190"> <summary> Send radacct_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_radacct_server_packets" lineno="72209"> <summary> Do not audit attempts to send radacct_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_radacct_server_packets" lineno="72228"> <summary> Receive radacct_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="72247"> <summary> Do not audit attempts to receive radacct_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_radacct_server_packets" lineno="72266"> <summary> Send and receive radacct_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="72282"> <summary> Do not audit attempts to send and receive radacct_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_radacct_server_packets" lineno="72297"> <summary> Relabel packets to radacct_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_radius_port" lineno="72319"> <summary> Send and receive TCP traffic on the radius port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_radius_port" lineno="72338"> <summary> Send UDP traffic on the radius port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_radius_port" lineno="72357"> <summary> Do not audit attempts to send UDP traffic on the radius port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_radius_port" lineno="72376"> <summary> Receive UDP traffic on the radius port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_radius_port" lineno="72395"> <summary> Do not audit attempts to receive UDP traffic on the radius port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_radius_port" lineno="72414"> <summary> Send and receive UDP traffic on the radius port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="72431"> <summary> Do not audit attempts to send and receive UDP traffic on the radius port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_radius_port" lineno="72447"> <summary> Bind TCP sockets to the radius port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_radius_port" lineno="72467"> <summary> Bind UDP sockets to the radius port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_radius_port" lineno="72486"> <summary> Make a TCP connection to the radius port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_radius_client_packets" lineno="72506"> <summary> Send radius_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_radius_client_packets" lineno="72525"> <summary> Do not audit attempts to send radius_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_radius_client_packets" lineno="72544"> <summary> Receive radius_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_radius_client_packets" lineno="72563"> <summary> Do not audit attempts to receive radius_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_radius_client_packets" lineno="72582"> <summary> Send and receive radius_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="72598"> <summary> Do not audit attempts to send and receive radius_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_radius_client_packets" lineno="72613"> <summary> Relabel packets to radius_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_radius_server_packets" lineno="72633"> <summary> Send radius_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_radius_server_packets" lineno="72652"> <summary> Do not audit attempts to send radius_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_radius_server_packets" lineno="72671"> <summary> Receive radius_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_radius_server_packets" lineno="72690"> <summary> Do not audit attempts to receive radius_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_radius_server_packets" lineno="72709"> <summary> Send and receive radius_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="72725"> <summary> Do not audit attempts to send and receive radius_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_radius_server_packets" lineno="72740"> <summary> Relabel packets to radius_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_radsec_port" lineno="72762"> <summary> Send and receive TCP traffic on the radsec port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_radsec_port" lineno="72781"> <summary> Send UDP traffic on the radsec port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_radsec_port" lineno="72800"> <summary> Do not audit attempts to send UDP traffic on the radsec port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_radsec_port" lineno="72819"> <summary> Receive UDP traffic on the radsec port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="72838"> <summary> Do not audit attempts to receive UDP traffic on the radsec port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_radsec_port" lineno="72857"> <summary> Send and receive UDP traffic on the radsec port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="72874"> <summary> Do not audit attempts to send and receive UDP traffic on the radsec port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_radsec_port" lineno="72890"> <summary> Bind TCP sockets to the radsec port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_radsec_port" lineno="72910"> <summary> Bind UDP sockets to the radsec port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_radsec_port" lineno="72929"> <summary> Make a TCP connection to the radsec port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_radsec_client_packets" lineno="72949"> <summary> Send radsec_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_radsec_client_packets" lineno="72968"> <summary> Do not audit attempts to send radsec_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_radsec_client_packets" lineno="72987"> <summary> Receive radsec_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="73006"> <summary> Do not audit attempts to receive radsec_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_radsec_client_packets" lineno="73025"> <summary> Send and receive radsec_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="73041"> <summary> Do not audit attempts to send and receive radsec_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_radsec_client_packets" lineno="73056"> <summary> Relabel packets to radsec_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_radsec_server_packets" lineno="73076"> <summary> Send radsec_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_radsec_server_packets" lineno="73095"> <summary> Do not audit attempts to send radsec_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_radsec_server_packets" lineno="73114"> <summary> Receive radsec_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="73133"> <summary> Do not audit attempts to receive radsec_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_radsec_server_packets" lineno="73152"> <summary> Send and receive radsec_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="73168"> <summary> Do not audit attempts to send and receive radsec_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_radsec_server_packets" lineno="73183"> <summary> Relabel packets to radsec_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_razor_port" lineno="73205"> <summary> Send and receive TCP traffic on the razor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_razor_port" lineno="73224"> <summary> Send UDP traffic on the razor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_razor_port" lineno="73243"> <summary> Do not audit attempts to send UDP traffic on the razor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_razor_port" lineno="73262"> <summary> Receive UDP traffic on the razor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_razor_port" lineno="73281"> <summary> Do not audit attempts to receive UDP traffic on the razor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_razor_port" lineno="73300"> <summary> Send and receive UDP traffic on the razor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="73317"> <summary> Do not audit attempts to send and receive UDP traffic on the razor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_razor_port" lineno="73333"> <summary> Bind TCP sockets to the razor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_razor_port" lineno="73353"> <summary> Bind UDP sockets to the razor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_razor_port" lineno="73372"> <summary> Make a TCP connection to the razor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_razor_client_packets" lineno="73392"> <summary> Send razor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_razor_client_packets" lineno="73411"> <summary> Do not audit attempts to send razor_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_razor_client_packets" lineno="73430"> <summary> Receive razor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_razor_client_packets" lineno="73449"> <summary> Do not audit attempts to receive razor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_razor_client_packets" lineno="73468"> <summary> Send and receive razor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="73484"> <summary> Do not audit attempts to send and receive razor_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_razor_client_packets" lineno="73499"> <summary> Relabel packets to razor_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_razor_server_packets" lineno="73519"> <summary> Send razor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_razor_server_packets" lineno="73538"> <summary> Do not audit attempts to send razor_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_razor_server_packets" lineno="73557"> <summary> Receive razor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_razor_server_packets" lineno="73576"> <summary> Do not audit attempts to receive razor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_razor_server_packets" lineno="73595"> <summary> Send and receive razor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="73611"> <summary> Do not audit attempts to send and receive razor_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_razor_server_packets" lineno="73626"> <summary> Relabel packets to razor_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_repository_port" lineno="73648"> <summary> Send and receive TCP traffic on the repository port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_repository_port" lineno="73667"> <summary> Send UDP traffic on the repository port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_repository_port" lineno="73686"> <summary> Do not audit attempts to send UDP traffic on the repository port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_repository_port" lineno="73705"> <summary> Receive UDP traffic on the repository port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_repository_port" lineno="73724"> <summary> Do not audit attempts to receive UDP traffic on the repository port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_repository_port" lineno="73743"> <summary> Send and receive UDP traffic on the repository port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="73760"> <summary> Do not audit attempts to send and receive UDP traffic on the repository port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_repository_port" lineno="73776"> <summary> Bind TCP sockets to the repository port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_repository_port" lineno="73796"> <summary> Bind UDP sockets to the repository port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_repository_port" lineno="73815"> <summary> Make a TCP connection to the repository port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_repository_client_packets" lineno="73835"> <summary> Send repository_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_repository_client_packets" lineno="73854"> <summary> Do not audit attempts to send repository_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_repository_client_packets" lineno="73873"> <summary> Receive repository_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_repository_client_packets" lineno="73892"> <summary> Do not audit attempts to receive repository_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_repository_client_packets" lineno="73911"> <summary> Send and receive repository_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="73927"> <summary> Do not audit attempts to send and receive repository_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_repository_client_packets" lineno="73942"> <summary> Relabel packets to repository_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_repository_server_packets" lineno="73962"> <summary> Send repository_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_repository_server_packets" lineno="73981"> <summary> Do not audit attempts to send repository_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_repository_server_packets" lineno="74000"> <summary> Receive repository_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_repository_server_packets" lineno="74019"> <summary> Do not audit attempts to receive repository_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_repository_server_packets" lineno="74038"> <summary> Send and receive repository_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="74054"> <summary> Do not audit attempts to send and receive repository_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_repository_server_packets" lineno="74069"> <summary> Relabel packets to repository_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ricci_port" lineno="74091"> <summary> Send and receive TCP traffic on the ricci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ricci_port" lineno="74110"> <summary> Send UDP traffic on the ricci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ricci_port" lineno="74129"> <summary> Do not audit attempts to send UDP traffic on the ricci port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ricci_port" lineno="74148"> <summary> Receive UDP traffic on the ricci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="74167"> <summary> Do not audit attempts to receive UDP traffic on the ricci port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ricci_port" lineno="74186"> <summary> Send and receive UDP traffic on the ricci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="74203"> <summary> Do not audit attempts to send and receive UDP traffic on the ricci port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ricci_port" lineno="74219"> <summary> Bind TCP sockets to the ricci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ricci_port" lineno="74239"> <summary> Bind UDP sockets to the ricci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ricci_port" lineno="74258"> <summary> Make a TCP connection to the ricci port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ricci_client_packets" lineno="74278"> <summary> Send ricci_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ricci_client_packets" lineno="74297"> <summary> Do not audit attempts to send ricci_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ricci_client_packets" lineno="74316"> <summary> Receive ricci_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="74335"> <summary> Do not audit attempts to receive ricci_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ricci_client_packets" lineno="74354"> <summary> Send and receive ricci_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="74370"> <summary> Do not audit attempts to send and receive ricci_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ricci_client_packets" lineno="74385"> <summary> Relabel packets to ricci_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ricci_server_packets" lineno="74405"> <summary> Send ricci_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ricci_server_packets" lineno="74424"> <summary> Do not audit attempts to send ricci_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ricci_server_packets" lineno="74443"> <summary> Receive ricci_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="74462"> <summary> Do not audit attempts to receive ricci_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ricci_server_packets" lineno="74481"> <summary> Send and receive ricci_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="74497"> <summary> Do not audit attempts to send and receive ricci_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ricci_server_packets" lineno="74512"> <summary> Relabel packets to ricci_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="74534"> <summary> Send and receive TCP traffic on the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ricci_modcluster_port" lineno="74553"> <summary> Send UDP traffic on the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="74572"> <summary> Do not audit attempts to send UDP traffic on the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ricci_modcluster_port" lineno="74591"> <summary> Receive UDP traffic on the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="74610"> <summary> Do not audit attempts to receive UDP traffic on the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="74629"> <summary> Send and receive UDP traffic on the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="74646"> <summary> Do not audit attempts to send and receive UDP traffic on the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="74662"> <summary> Bind TCP sockets to the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ricci_modcluster_port" lineno="74682"> <summary> Bind UDP sockets to the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="74701"> <summary> Make a TCP connection to the ricci_modcluster port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ricci_modcluster_client_packets" lineno="74721"> <summary> Send ricci_modcluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="74740"> <summary> Do not audit attempts to send ricci_modcluster_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ricci_modcluster_client_packets" lineno="74759"> <summary> Receive ricci_modcluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="74778"> <summary> Do not audit attempts to receive ricci_modcluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="74797"> <summary> Send and receive ricci_modcluster_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="74813"> <summary> Do not audit attempts to send and receive ricci_modcluster_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="74828"> <summary> Relabel packets to ricci_modcluster_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ricci_modcluster_server_packets" lineno="74848"> <summary> Send ricci_modcluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="74867"> <summary> Do not audit attempts to send ricci_modcluster_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ricci_modcluster_server_packets" lineno="74886"> <summary> Receive ricci_modcluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="74905"> <summary> Do not audit attempts to receive ricci_modcluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="74924"> <summary> Send and receive ricci_modcluster_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="74940"> <summary> Do not audit attempts to send and receive ricci_modcluster_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="74955"> <summary> Relabel packets to ricci_modcluster_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_rlogind_port" lineno="74977"> <summary> Send and receive TCP traffic on the rlogind port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_rlogind_port" lineno="74996"> <summary> Send UDP traffic on the rlogind port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="75015"> <summary> Do not audit attempts to send UDP traffic on the rlogind port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_rlogind_port" lineno="75034"> <summary> Receive UDP traffic on the rlogind port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="75053"> <summary> Do not audit attempts to receive UDP traffic on the rlogind port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_rlogind_port" lineno="75072"> <summary> Send and receive UDP traffic on the rlogind port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="75089"> <summary> Do not audit attempts to send and receive UDP traffic on the rlogind port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_rlogind_port" lineno="75105"> <summary> Bind TCP sockets to the rlogind port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_rlogind_port" lineno="75125"> <summary> Bind UDP sockets to the rlogind port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_rlogind_port" lineno="75144"> <summary> Make a TCP connection to the rlogind port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rlogind_client_packets" lineno="75164"> <summary> Send rlogind_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="75183"> <summary> Do not audit attempts to send rlogind_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rlogind_client_packets" lineno="75202"> <summary> Receive rlogind_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="75221"> <summary> Do not audit attempts to receive rlogind_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rlogind_client_packets" lineno="75240"> <summary> Send and receive rlogind_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="75256"> <summary> Do not audit attempts to send and receive rlogind_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rlogind_client_packets" lineno="75271"> <summary> Relabel packets to rlogind_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rlogind_server_packets" lineno="75291"> <summary> Send rlogind_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="75310"> <summary> Do not audit attempts to send rlogind_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rlogind_server_packets" lineno="75329"> <summary> Receive rlogind_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="75348"> <summary> Do not audit attempts to receive rlogind_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rlogind_server_packets" lineno="75367"> <summary> Send and receive rlogind_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="75383"> <summary> Do not audit attempts to send and receive rlogind_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rlogind_server_packets" lineno="75398"> <summary> Relabel packets to rlogind_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_rndc_port" lineno="75420"> <summary> Send and receive TCP traffic on the rndc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_rndc_port" lineno="75439"> <summary> Send UDP traffic on the rndc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_rndc_port" lineno="75458"> <summary> Do not audit attempts to send UDP traffic on the rndc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_rndc_port" lineno="75477"> <summary> Receive UDP traffic on the rndc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="75496"> <summary> Do not audit attempts to receive UDP traffic on the rndc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_rndc_port" lineno="75515"> <summary> Send and receive UDP traffic on the rndc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="75532"> <summary> Do not audit attempts to send and receive UDP traffic on the rndc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_rndc_port" lineno="75548"> <summary> Bind TCP sockets to the rndc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_rndc_port" lineno="75568"> <summary> Bind UDP sockets to the rndc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_rndc_port" lineno="75587"> <summary> Make a TCP connection to the rndc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rndc_client_packets" lineno="75607"> <summary> Send rndc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rndc_client_packets" lineno="75626"> <summary> Do not audit attempts to send rndc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rndc_client_packets" lineno="75645"> <summary> Receive rndc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="75664"> <summary> Do not audit attempts to receive rndc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rndc_client_packets" lineno="75683"> <summary> Send and receive rndc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="75699"> <summary> Do not audit attempts to send and receive rndc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rndc_client_packets" lineno="75714"> <summary> Relabel packets to rndc_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rndc_server_packets" lineno="75734"> <summary> Send rndc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rndc_server_packets" lineno="75753"> <summary> Do not audit attempts to send rndc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rndc_server_packets" lineno="75772"> <summary> Receive rndc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="75791"> <summary> Do not audit attempts to receive rndc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rndc_server_packets" lineno="75810"> <summary> Send and receive rndc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="75826"> <summary> Do not audit attempts to send and receive rndc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rndc_server_packets" lineno="75841"> <summary> Relabel packets to rndc_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_router_port" lineno="75863"> <summary> Send and receive TCP traffic on the router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_router_port" lineno="75882"> <summary> Send UDP traffic on the router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_router_port" lineno="75901"> <summary> Do not audit attempts to send UDP traffic on the router port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_router_port" lineno="75920"> <summary> Receive UDP traffic on the router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_router_port" lineno="75939"> <summary> Do not audit attempts to receive UDP traffic on the router port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_router_port" lineno="75958"> <summary> Send and receive UDP traffic on the router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="75975"> <summary> Do not audit attempts to send and receive UDP traffic on the router port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_router_port" lineno="75991"> <summary> Bind TCP sockets to the router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_router_port" lineno="76011"> <summary> Bind UDP sockets to the router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_router_port" lineno="76030"> <summary> Make a TCP connection to the router port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_router_client_packets" lineno="76050"> <summary> Send router_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_router_client_packets" lineno="76069"> <summary> Do not audit attempts to send router_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_router_client_packets" lineno="76088"> <summary> Receive router_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_router_client_packets" lineno="76107"> <summary> Do not audit attempts to receive router_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_router_client_packets" lineno="76126"> <summary> Send and receive router_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="76142"> <summary> Do not audit attempts to send and receive router_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_router_client_packets" lineno="76157"> <summary> Relabel packets to router_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_router_server_packets" lineno="76177"> <summary> Send router_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_router_server_packets" lineno="76196"> <summary> Do not audit attempts to send router_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_router_server_packets" lineno="76215"> <summary> Receive router_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_router_server_packets" lineno="76234"> <summary> Do not audit attempts to receive router_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_router_server_packets" lineno="76253"> <summary> Send and receive router_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="76269"> <summary> Do not audit attempts to send and receive router_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_router_server_packets" lineno="76284"> <summary> Relabel packets to router_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_rsh_port" lineno="76306"> <summary> Send and receive TCP traffic on the rsh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_rsh_port" lineno="76325"> <summary> Send UDP traffic on the rsh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_rsh_port" lineno="76344"> <summary> Do not audit attempts to send UDP traffic on the rsh port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_rsh_port" lineno="76363"> <summary> Receive UDP traffic on the rsh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="76382"> <summary> Do not audit attempts to receive UDP traffic on the rsh port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_rsh_port" lineno="76401"> <summary> Send and receive UDP traffic on the rsh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="76418"> <summary> Do not audit attempts to send and receive UDP traffic on the rsh port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_rsh_port" lineno="76434"> <summary> Bind TCP sockets to the rsh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_rsh_port" lineno="76454"> <summary> Bind UDP sockets to the rsh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_rsh_port" lineno="76473"> <summary> Make a TCP connection to the rsh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rsh_client_packets" lineno="76493"> <summary> Send rsh_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rsh_client_packets" lineno="76512"> <summary> Do not audit attempts to send rsh_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rsh_client_packets" lineno="76531"> <summary> Receive rsh_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="76550"> <summary> Do not audit attempts to receive rsh_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rsh_client_packets" lineno="76569"> <summary> Send and receive rsh_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="76585"> <summary> Do not audit attempts to send and receive rsh_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rsh_client_packets" lineno="76600"> <summary> Relabel packets to rsh_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rsh_server_packets" lineno="76620"> <summary> Send rsh_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rsh_server_packets" lineno="76639"> <summary> Do not audit attempts to send rsh_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rsh_server_packets" lineno="76658"> <summary> Receive rsh_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="76677"> <summary> Do not audit attempts to receive rsh_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rsh_server_packets" lineno="76696"> <summary> Send and receive rsh_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="76712"> <summary> Do not audit attempts to send and receive rsh_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rsh_server_packets" lineno="76727"> <summary> Relabel packets to rsh_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_rsync_port" lineno="76749"> <summary> Send and receive TCP traffic on the rsync port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_rsync_port" lineno="76768"> <summary> Send UDP traffic on the rsync port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_rsync_port" lineno="76787"> <summary> Do not audit attempts to send UDP traffic on the rsync port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_rsync_port" lineno="76806"> <summary> Receive UDP traffic on the rsync port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="76825"> <summary> Do not audit attempts to receive UDP traffic on the rsync port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_rsync_port" lineno="76844"> <summary> Send and receive UDP traffic on the rsync port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="76861"> <summary> Do not audit attempts to send and receive UDP traffic on the rsync port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_rsync_port" lineno="76877"> <summary> Bind TCP sockets to the rsync port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_rsync_port" lineno="76897"> <summary> Bind UDP sockets to the rsync port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_rsync_port" lineno="76916"> <summary> Make a TCP connection to the rsync port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rsync_client_packets" lineno="76936"> <summary> Send rsync_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rsync_client_packets" lineno="76955"> <summary> Do not audit attempts to send rsync_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rsync_client_packets" lineno="76974"> <summary> Receive rsync_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="76993"> <summary> Do not audit attempts to receive rsync_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rsync_client_packets" lineno="77012"> <summary> Send and receive rsync_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="77028"> <summary> Do not audit attempts to send and receive rsync_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rsync_client_packets" lineno="77043"> <summary> Relabel packets to rsync_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rsync_server_packets" lineno="77063"> <summary> Send rsync_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rsync_server_packets" lineno="77082"> <summary> Do not audit attempts to send rsync_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rsync_server_packets" lineno="77101"> <summary> Receive rsync_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="77120"> <summary> Do not audit attempts to receive rsync_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rsync_server_packets" lineno="77139"> <summary> Send and receive rsync_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="77155"> <summary> Do not audit attempts to send and receive rsync_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rsync_server_packets" lineno="77170"> <summary> Relabel packets to rsync_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_rwho_port" lineno="77192"> <summary> Send and receive TCP traffic on the rwho port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_rwho_port" lineno="77211"> <summary> Send UDP traffic on the rwho port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_rwho_port" lineno="77230"> <summary> Do not audit attempts to send UDP traffic on the rwho port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_rwho_port" lineno="77249"> <summary> Receive UDP traffic on the rwho port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="77268"> <summary> Do not audit attempts to receive UDP traffic on the rwho port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_rwho_port" lineno="77287"> <summary> Send and receive UDP traffic on the rwho port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="77304"> <summary> Do not audit attempts to send and receive UDP traffic on the rwho port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_rwho_port" lineno="77320"> <summary> Bind TCP sockets to the rwho port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_rwho_port" lineno="77340"> <summary> Bind UDP sockets to the rwho port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_rwho_port" lineno="77359"> <summary> Make a TCP connection to the rwho port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rwho_client_packets" lineno="77379"> <summary> Send rwho_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rwho_client_packets" lineno="77398"> <summary> Do not audit attempts to send rwho_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rwho_client_packets" lineno="77417"> <summary> Receive rwho_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="77436"> <summary> Do not audit attempts to receive rwho_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rwho_client_packets" lineno="77455"> <summary> Send and receive rwho_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="77471"> <summary> Do not audit attempts to send and receive rwho_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rwho_client_packets" lineno="77486"> <summary> Relabel packets to rwho_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_rwho_server_packets" lineno="77506"> <summary> Send rwho_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_rwho_server_packets" lineno="77525"> <summary> Do not audit attempts to send rwho_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_rwho_server_packets" lineno="77544"> <summary> Receive rwho_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="77563"> <summary> Do not audit attempts to receive rwho_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_rwho_server_packets" lineno="77582"> <summary> Send and receive rwho_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="77598"> <summary> Do not audit attempts to send and receive rwho_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_rwho_server_packets" lineno="77613"> <summary> Relabel packets to rwho_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_sap_port" lineno="77635"> <summary> Send and receive TCP traffic on the sap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_sap_port" lineno="77654"> <summary> Send UDP traffic on the sap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_sap_port" lineno="77673"> <summary> Do not audit attempts to send UDP traffic on the sap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_sap_port" lineno="77692"> <summary> Receive UDP traffic on the sap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_sap_port" lineno="77711"> <summary> Do not audit attempts to receive UDP traffic on the sap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_sap_port" lineno="77730"> <summary> Send and receive UDP traffic on the sap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="77747"> <summary> Do not audit attempts to send and receive UDP traffic on the sap port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_sap_port" lineno="77763"> <summary> Bind TCP sockets to the sap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_sap_port" lineno="77783"> <summary> Bind UDP sockets to the sap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_sap_port" lineno="77802"> <summary> Make a TCP connection to the sap port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sap_client_packets" lineno="77822"> <summary> Send sap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sap_client_packets" lineno="77841"> <summary> Do not audit attempts to send sap_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sap_client_packets" lineno="77860"> <summary> Receive sap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sap_client_packets" lineno="77879"> <summary> Do not audit attempts to receive sap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sap_client_packets" lineno="77898"> <summary> Send and receive sap_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="77914"> <summary> Do not audit attempts to send and receive sap_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sap_client_packets" lineno="77929"> <summary> Relabel packets to sap_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sap_server_packets" lineno="77949"> <summary> Send sap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sap_server_packets" lineno="77968"> <summary> Do not audit attempts to send sap_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sap_server_packets" lineno="77987"> <summary> Receive sap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sap_server_packets" lineno="78006"> <summary> Do not audit attempts to receive sap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sap_server_packets" lineno="78025"> <summary> Send and receive sap_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="78041"> <summary> Do not audit attempts to send and receive sap_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sap_server_packets" lineno="78056"> <summary> Relabel packets to sap_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_saphostctrl_port" lineno="78078"> <summary> Send and receive TCP traffic on the saphostctrl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_saphostctrl_port" lineno="78097"> <summary> Send UDP traffic on the saphostctrl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_saphostctrl_port" lineno="78116"> <summary> Do not audit attempts to send UDP traffic on the saphostctrl port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_saphostctrl_port" lineno="78135"> <summary> Receive UDP traffic on the saphostctrl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_saphostctrl_port" lineno="78154"> <summary> Do not audit attempts to receive UDP traffic on the saphostctrl port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_saphostctrl_port" lineno="78173"> <summary> Send and receive UDP traffic on the saphostctrl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_saphostctrl_port" lineno="78190"> <summary> Do not audit attempts to send and receive UDP traffic on the saphostctrl port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_saphostctrl_port" lineno="78206"> <summary> Bind TCP sockets to the saphostctrl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_saphostctrl_port" lineno="78226"> <summary> Bind UDP sockets to the saphostctrl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_saphostctrl_port" lineno="78245"> <summary> Make a TCP connection to the saphostctrl port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_saphostctrl_client_packets" lineno="78265"> <summary> Send saphostctrl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_saphostctrl_client_packets" lineno="78284"> <summary> Do not audit attempts to send saphostctrl_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_saphostctrl_client_packets" lineno="78303"> <summary> Receive saphostctrl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_saphostctrl_client_packets" lineno="78322"> <summary> Do not audit attempts to receive saphostctrl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_saphostctrl_client_packets" lineno="78341"> <summary> Send and receive saphostctrl_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_saphostctrl_client_packets" lineno="78357"> <summary> Do not audit attempts to send and receive saphostctrl_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_saphostctrl_client_packets" lineno="78372"> <summary> Relabel packets to saphostctrl_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_saphostctrl_server_packets" lineno="78392"> <summary> Send saphostctrl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_saphostctrl_server_packets" lineno="78411"> <summary> Do not audit attempts to send saphostctrl_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_saphostctrl_server_packets" lineno="78430"> <summary> Receive saphostctrl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_saphostctrl_server_packets" lineno="78449"> <summary> Do not audit attempts to receive saphostctrl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_saphostctrl_server_packets" lineno="78468"> <summary> Send and receive saphostctrl_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_saphostctrl_server_packets" lineno="78484"> <summary> Do not audit attempts to send and receive saphostctrl_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_saphostctrl_server_packets" lineno="78499"> <summary> Relabel packets to saphostctrl_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_sieve_port" lineno="78521"> <summary> Send and receive TCP traffic on the sieve port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_sieve_port" lineno="78540"> <summary> Send UDP traffic on the sieve port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_sieve_port" lineno="78559"> <summary> Do not audit attempts to send UDP traffic on the sieve port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_sieve_port" lineno="78578"> <summary> Receive UDP traffic on the sieve port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="78597"> <summary> Do not audit attempts to receive UDP traffic on the sieve port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_sieve_port" lineno="78616"> <summary> Send and receive UDP traffic on the sieve port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="78633"> <summary> Do not audit attempts to send and receive UDP traffic on the sieve port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_sieve_port" lineno="78649"> <summary> Bind TCP sockets to the sieve port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_sieve_port" lineno="78669"> <summary> Bind UDP sockets to the sieve port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_sieve_port" lineno="78688"> <summary> Make a TCP connection to the sieve port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sieve_client_packets" lineno="78708"> <summary> Send sieve_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sieve_client_packets" lineno="78727"> <summary> Do not audit attempts to send sieve_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sieve_client_packets" lineno="78746"> <summary> Receive sieve_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="78765"> <summary> Do not audit attempts to receive sieve_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sieve_client_packets" lineno="78784"> <summary> Send and receive sieve_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="78800"> <summary> Do not audit attempts to send and receive sieve_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sieve_client_packets" lineno="78815"> <summary> Relabel packets to sieve_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sieve_server_packets" lineno="78835"> <summary> Send sieve_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sieve_server_packets" lineno="78854"> <summary> Do not audit attempts to send sieve_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sieve_server_packets" lineno="78873"> <summary> Receive sieve_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="78892"> <summary> Do not audit attempts to receive sieve_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sieve_server_packets" lineno="78911"> <summary> Send and receive sieve_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="78927"> <summary> Do not audit attempts to send and receive sieve_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sieve_server_packets" lineno="78942"> <summary> Relabel packets to sieve_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_sip_port" lineno="78964"> <summary> Send and receive TCP traffic on the sip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_sip_port" lineno="78983"> <summary> Send UDP traffic on the sip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_sip_port" lineno="79002"> <summary> Do not audit attempts to send UDP traffic on the sip port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_sip_port" lineno="79021"> <summary> Receive UDP traffic on the sip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_sip_port" lineno="79040"> <summary> Do not audit attempts to receive UDP traffic on the sip port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_sip_port" lineno="79059"> <summary> Send and receive UDP traffic on the sip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="79076"> <summary> Do not audit attempts to send and receive UDP traffic on the sip port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_sip_port" lineno="79092"> <summary> Bind TCP sockets to the sip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_sip_port" lineno="79112"> <summary> Bind UDP sockets to the sip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_sip_port" lineno="79131"> <summary> Make a TCP connection to the sip port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sip_client_packets" lineno="79151"> <summary> Send sip_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sip_client_packets" lineno="79170"> <summary> Do not audit attempts to send sip_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sip_client_packets" lineno="79189"> <summary> Receive sip_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sip_client_packets" lineno="79208"> <summary> Do not audit attempts to receive sip_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sip_client_packets" lineno="79227"> <summary> Send and receive sip_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="79243"> <summary> Do not audit attempts to send and receive sip_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sip_client_packets" lineno="79258"> <summary> Relabel packets to sip_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sip_server_packets" lineno="79278"> <summary> Send sip_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sip_server_packets" lineno="79297"> <summary> Do not audit attempts to send sip_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sip_server_packets" lineno="79316"> <summary> Receive sip_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sip_server_packets" lineno="79335"> <summary> Do not audit attempts to receive sip_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sip_server_packets" lineno="79354"> <summary> Send and receive sip_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="79370"> <summary> Do not audit attempts to send and receive sip_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sip_server_packets" lineno="79385"> <summary> Relabel packets to sip_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="79407"> <summary> Send and receive TCP traffic on the sixxsconfig port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_sixxsconfig_port" lineno="79426"> <summary> Send UDP traffic on the sixxsconfig port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="79445"> <summary> Do not audit attempts to send UDP traffic on the sixxsconfig port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_sixxsconfig_port" lineno="79464"> <summary> Receive UDP traffic on the sixxsconfig port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="79483"> <summary> Do not audit attempts to receive UDP traffic on the sixxsconfig port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="79502"> <summary> Send and receive UDP traffic on the sixxsconfig port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="79519"> <summary> Do not audit attempts to send and receive UDP traffic on the sixxsconfig port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_sixxsconfig_port" lineno="79535"> <summary> Bind TCP sockets to the sixxsconfig port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_sixxsconfig_port" lineno="79555"> <summary> Bind UDP sockets to the sixxsconfig port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_sixxsconfig_port" lineno="79574"> <summary> Make a TCP connection to the sixxsconfig port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sixxsconfig_client_packets" lineno="79594"> <summary> Send sixxsconfig_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="79613"> <summary> Do not audit attempts to send sixxsconfig_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sixxsconfig_client_packets" lineno="79632"> <summary> Receive sixxsconfig_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="79651"> <summary> Do not audit attempts to receive sixxsconfig_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="79670"> <summary> Send and receive sixxsconfig_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="79686"> <summary> Do not audit attempts to send and receive sixxsconfig_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="79701"> <summary> Relabel packets to sixxsconfig_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sixxsconfig_server_packets" lineno="79721"> <summary> Send sixxsconfig_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="79740"> <summary> Do not audit attempts to send sixxsconfig_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sixxsconfig_server_packets" lineno="79759"> <summary> Receive sixxsconfig_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="79778"> <summary> Do not audit attempts to receive sixxsconfig_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="79797"> <summary> Send and receive sixxsconfig_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="79813"> <summary> Do not audit attempts to send and receive sixxsconfig_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="79828"> <summary> Relabel packets to sixxsconfig_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_smbd_port" lineno="79850"> <summary> Send and receive TCP traffic on the smbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_smbd_port" lineno="79869"> <summary> Send UDP traffic on the smbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_smbd_port" lineno="79888"> <summary> Do not audit attempts to send UDP traffic on the smbd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_smbd_port" lineno="79907"> <summary> Receive UDP traffic on the smbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="79926"> <summary> Do not audit attempts to receive UDP traffic on the smbd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_smbd_port" lineno="79945"> <summary> Send and receive UDP traffic on the smbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="79962"> <summary> Do not audit attempts to send and receive UDP traffic on the smbd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_smbd_port" lineno="79978"> <summary> Bind TCP sockets to the smbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_smbd_port" lineno="79998"> <summary> Bind UDP sockets to the smbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_smbd_port" lineno="80017"> <summary> Make a TCP connection to the smbd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_smbd_client_packets" lineno="80037"> <summary> Send smbd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_smbd_client_packets" lineno="80056"> <summary> Do not audit attempts to send smbd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_smbd_client_packets" lineno="80075"> <summary> Receive smbd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="80094"> <summary> Do not audit attempts to receive smbd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_smbd_client_packets" lineno="80113"> <summary> Send and receive smbd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="80129"> <summary> Do not audit attempts to send and receive smbd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_smbd_client_packets" lineno="80144"> <summary> Relabel packets to smbd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_smbd_server_packets" lineno="80164"> <summary> Send smbd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_smbd_server_packets" lineno="80183"> <summary> Do not audit attempts to send smbd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_smbd_server_packets" lineno="80202"> <summary> Receive smbd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="80221"> <summary> Do not audit attempts to receive smbd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_smbd_server_packets" lineno="80240"> <summary> Send and receive smbd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="80256"> <summary> Do not audit attempts to send and receive smbd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_smbd_server_packets" lineno="80271"> <summary> Relabel packets to smbd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_smtp_port" lineno="80293"> <summary> Send and receive TCP traffic on the smtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_smtp_port" lineno="80312"> <summary> Send UDP traffic on the smtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_smtp_port" lineno="80331"> <summary> Do not audit attempts to send UDP traffic on the smtp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_smtp_port" lineno="80350"> <summary> Receive UDP traffic on the smtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="80369"> <summary> Do not audit attempts to receive UDP traffic on the smtp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_smtp_port" lineno="80388"> <summary> Send and receive UDP traffic on the smtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="80405"> <summary> Do not audit attempts to send and receive UDP traffic on the smtp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_smtp_port" lineno="80421"> <summary> Bind TCP sockets to the smtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_smtp_port" lineno="80441"> <summary> Bind UDP sockets to the smtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_smtp_port" lineno="80460"> <summary> Make a TCP connection to the smtp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_smtp_client_packets" lineno="80480"> <summary> Send smtp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_smtp_client_packets" lineno="80499"> <summary> Do not audit attempts to send smtp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_smtp_client_packets" lineno="80518"> <summary> Receive smtp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="80537"> <summary> Do not audit attempts to receive smtp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_smtp_client_packets" lineno="80556"> <summary> Send and receive smtp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="80572"> <summary> Do not audit attempts to send and receive smtp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_smtp_client_packets" lineno="80587"> <summary> Relabel packets to smtp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_smtp_server_packets" lineno="80607"> <summary> Send smtp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_smtp_server_packets" lineno="80626"> <summary> Do not audit attempts to send smtp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_smtp_server_packets" lineno="80645"> <summary> Receive smtp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="80664"> <summary> Do not audit attempts to receive smtp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_smtp_server_packets" lineno="80683"> <summary> Send and receive smtp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="80699"> <summary> Do not audit attempts to send and receive smtp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_smtp_server_packets" lineno="80714"> <summary> Relabel packets to smtp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_snmp_port" lineno="80736"> <summary> Send and receive TCP traffic on the snmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_snmp_port" lineno="80755"> <summary> Send UDP traffic on the snmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_snmp_port" lineno="80774"> <summary> Do not audit attempts to send UDP traffic on the snmp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_snmp_port" lineno="80793"> <summary> Receive UDP traffic on the snmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="80812"> <summary> Do not audit attempts to receive UDP traffic on the snmp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_snmp_port" lineno="80831"> <summary> Send and receive UDP traffic on the snmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="80848"> <summary> Do not audit attempts to send and receive UDP traffic on the snmp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_snmp_port" lineno="80864"> <summary> Bind TCP sockets to the snmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_snmp_port" lineno="80884"> <summary> Bind UDP sockets to the snmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_snmp_port" lineno="80903"> <summary> Make a TCP connection to the snmp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_snmp_client_packets" lineno="80923"> <summary> Send snmp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_snmp_client_packets" lineno="80942"> <summary> Do not audit attempts to send snmp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_snmp_client_packets" lineno="80961"> <summary> Receive snmp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="80980"> <summary> Do not audit attempts to receive snmp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_snmp_client_packets" lineno="80999"> <summary> Send and receive snmp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="81015"> <summary> Do not audit attempts to send and receive snmp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_snmp_client_packets" lineno="81030"> <summary> Relabel packets to snmp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_snmp_server_packets" lineno="81050"> <summary> Send snmp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_snmp_server_packets" lineno="81069"> <summary> Do not audit attempts to send snmp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_snmp_server_packets" lineno="81088"> <summary> Receive snmp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="81107"> <summary> Do not audit attempts to receive snmp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_snmp_server_packets" lineno="81126"> <summary> Send and receive snmp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="81142"> <summary> Do not audit attempts to send and receive snmp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_snmp_server_packets" lineno="81157"> <summary> Relabel packets to snmp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_soundd_port" lineno="81179"> <summary> Send and receive TCP traffic on the soundd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_soundd_port" lineno="81198"> <summary> Send UDP traffic on the soundd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_soundd_port" lineno="81217"> <summary> Do not audit attempts to send UDP traffic on the soundd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_soundd_port" lineno="81236"> <summary> Receive UDP traffic on the soundd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="81255"> <summary> Do not audit attempts to receive UDP traffic on the soundd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_soundd_port" lineno="81274"> <summary> Send and receive UDP traffic on the soundd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="81291"> <summary> Do not audit attempts to send and receive UDP traffic on the soundd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_soundd_port" lineno="81307"> <summary> Bind TCP sockets to the soundd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_soundd_port" lineno="81327"> <summary> Bind UDP sockets to the soundd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_soundd_port" lineno="81346"> <summary> Make a TCP connection to the soundd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_soundd_client_packets" lineno="81366"> <summary> Send soundd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_soundd_client_packets" lineno="81385"> <summary> Do not audit attempts to send soundd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_soundd_client_packets" lineno="81404"> <summary> Receive soundd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="81423"> <summary> Do not audit attempts to receive soundd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_soundd_client_packets" lineno="81442"> <summary> Send and receive soundd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="81458"> <summary> Do not audit attempts to send and receive soundd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_soundd_client_packets" lineno="81473"> <summary> Relabel packets to soundd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_soundd_server_packets" lineno="81493"> <summary> Send soundd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_soundd_server_packets" lineno="81512"> <summary> Do not audit attempts to send soundd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_soundd_server_packets" lineno="81531"> <summary> Receive soundd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="81550"> <summary> Do not audit attempts to receive soundd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_soundd_server_packets" lineno="81569"> <summary> Send and receive soundd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="81585"> <summary> Do not audit attempts to send and receive soundd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_soundd_server_packets" lineno="81600"> <summary> Relabel packets to soundd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_spamd_port" lineno="81622"> <summary> Send and receive TCP traffic on the spamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_spamd_port" lineno="81641"> <summary> Send UDP traffic on the spamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_spamd_port" lineno="81660"> <summary> Do not audit attempts to send UDP traffic on the spamd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_spamd_port" lineno="81679"> <summary> Receive UDP traffic on the spamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="81698"> <summary> Do not audit attempts to receive UDP traffic on the spamd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_spamd_port" lineno="81717"> <summary> Send and receive UDP traffic on the spamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="81734"> <summary> Do not audit attempts to send and receive UDP traffic on the spamd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_spamd_port" lineno="81750"> <summary> Bind TCP sockets to the spamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_spamd_port" lineno="81770"> <summary> Bind UDP sockets to the spamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_spamd_port" lineno="81789"> <summary> Make a TCP connection to the spamd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_spamd_client_packets" lineno="81809"> <summary> Send spamd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_spamd_client_packets" lineno="81828"> <summary> Do not audit attempts to send spamd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_spamd_client_packets" lineno="81847"> <summary> Receive spamd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="81866"> <summary> Do not audit attempts to receive spamd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_spamd_client_packets" lineno="81885"> <summary> Send and receive spamd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="81901"> <summary> Do not audit attempts to send and receive spamd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_spamd_client_packets" lineno="81916"> <summary> Relabel packets to spamd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_spamd_server_packets" lineno="81936"> <summary> Send spamd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_spamd_server_packets" lineno="81955"> <summary> Do not audit attempts to send spamd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_spamd_server_packets" lineno="81974"> <summary> Receive spamd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="81993"> <summary> Do not audit attempts to receive spamd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_spamd_server_packets" lineno="82012"> <summary> Send and receive spamd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="82028"> <summary> Do not audit attempts to send and receive spamd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_spamd_server_packets" lineno="82043"> <summary> Relabel packets to spamd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_speech_port" lineno="82065"> <summary> Send and receive TCP traffic on the speech port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_speech_port" lineno="82084"> <summary> Send UDP traffic on the speech port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_speech_port" lineno="82103"> <summary> Do not audit attempts to send UDP traffic on the speech port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_speech_port" lineno="82122"> <summary> Receive UDP traffic on the speech port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_speech_port" lineno="82141"> <summary> Do not audit attempts to receive UDP traffic on the speech port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_speech_port" lineno="82160"> <summary> Send and receive UDP traffic on the speech port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="82177"> <summary> Do not audit attempts to send and receive UDP traffic on the speech port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_speech_port" lineno="82193"> <summary> Bind TCP sockets to the speech port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_speech_port" lineno="82213"> <summary> Bind UDP sockets to the speech port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_speech_port" lineno="82232"> <summary> Make a TCP connection to the speech port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_speech_client_packets" lineno="82252"> <summary> Send speech_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_speech_client_packets" lineno="82271"> <summary> Do not audit attempts to send speech_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_speech_client_packets" lineno="82290"> <summary> Receive speech_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_speech_client_packets" lineno="82309"> <summary> Do not audit attempts to receive speech_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_speech_client_packets" lineno="82328"> <summary> Send and receive speech_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="82344"> <summary> Do not audit attempts to send and receive speech_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_speech_client_packets" lineno="82359"> <summary> Relabel packets to speech_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_speech_server_packets" lineno="82379"> <summary> Send speech_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_speech_server_packets" lineno="82398"> <summary> Do not audit attempts to send speech_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_speech_server_packets" lineno="82417"> <summary> Receive speech_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_speech_server_packets" lineno="82436"> <summary> Do not audit attempts to receive speech_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_speech_server_packets" lineno="82455"> <summary> Send and receive speech_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="82471"> <summary> Do not audit attempts to send and receive speech_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_speech_server_packets" lineno="82486"> <summary> Relabel packets to speech_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_squid_port" lineno="82508"> <summary> Send and receive TCP traffic on the squid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_squid_port" lineno="82527"> <summary> Send UDP traffic on the squid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_squid_port" lineno="82546"> <summary> Do not audit attempts to send UDP traffic on the squid port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_squid_port" lineno="82565"> <summary> Receive UDP traffic on the squid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_squid_port" lineno="82584"> <summary> Do not audit attempts to receive UDP traffic on the squid port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_squid_port" lineno="82603"> <summary> Send and receive UDP traffic on the squid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="82620"> <summary> Do not audit attempts to send and receive UDP traffic on the squid port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_squid_port" lineno="82636"> <summary> Bind TCP sockets to the squid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_squid_port" lineno="82656"> <summary> Bind UDP sockets to the squid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_squid_port" lineno="82675"> <summary> Make a TCP connection to the squid port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_squid_client_packets" lineno="82695"> <summary> Send squid_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_squid_client_packets" lineno="82714"> <summary> Do not audit attempts to send squid_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_squid_client_packets" lineno="82733"> <summary> Receive squid_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_squid_client_packets" lineno="82752"> <summary> Do not audit attempts to receive squid_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_squid_client_packets" lineno="82771"> <summary> Send and receive squid_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="82787"> <summary> Do not audit attempts to send and receive squid_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_squid_client_packets" lineno="82802"> <summary> Relabel packets to squid_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_squid_server_packets" lineno="82822"> <summary> Send squid_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_squid_server_packets" lineno="82841"> <summary> Do not audit attempts to send squid_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_squid_server_packets" lineno="82860"> <summary> Receive squid_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_squid_server_packets" lineno="82879"> <summary> Do not audit attempts to receive squid_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_squid_server_packets" lineno="82898"> <summary> Send and receive squid_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="82914"> <summary> Do not audit attempts to send and receive squid_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_squid_server_packets" lineno="82929"> <summary> Relabel packets to squid_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ssh_port" lineno="82951"> <summary> Send and receive TCP traffic on the ssh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ssh_port" lineno="82970"> <summary> Send UDP traffic on the ssh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ssh_port" lineno="82989"> <summary> Do not audit attempts to send UDP traffic on the ssh port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ssh_port" lineno="83008"> <summary> Receive UDP traffic on the ssh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="83027"> <summary> Do not audit attempts to receive UDP traffic on the ssh port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ssh_port" lineno="83046"> <summary> Send and receive UDP traffic on the ssh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="83063"> <summary> Do not audit attempts to send and receive UDP traffic on the ssh port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ssh_port" lineno="83079"> <summary> Bind TCP sockets to the ssh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ssh_port" lineno="83099"> <summary> Bind UDP sockets to the ssh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ssh_port" lineno="83118"> <summary> Make a TCP connection to the ssh port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ssh_client_packets" lineno="83138"> <summary> Send ssh_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ssh_client_packets" lineno="83157"> <summary> Do not audit attempts to send ssh_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ssh_client_packets" lineno="83176"> <summary> Receive ssh_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="83195"> <summary> Do not audit attempts to receive ssh_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ssh_client_packets" lineno="83214"> <summary> Send and receive ssh_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="83230"> <summary> Do not audit attempts to send and receive ssh_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ssh_client_packets" lineno="83245"> <summary> Relabel packets to ssh_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ssh_server_packets" lineno="83265"> <summary> Send ssh_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ssh_server_packets" lineno="83284"> <summary> Do not audit attempts to send ssh_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ssh_server_packets" lineno="83303"> <summary> Receive ssh_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="83322"> <summary> Do not audit attempts to receive ssh_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ssh_server_packets" lineno="83341"> <summary> Send and receive ssh_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="83357"> <summary> Do not audit attempts to send and receive ssh_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ssh_server_packets" lineno="83372"> <summary> Relabel packets to ssh_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_streaming_port" lineno="83394"> <summary> Send and receive TCP traffic on the streaming port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_streaming_port" lineno="83413"> <summary> Send UDP traffic on the streaming port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_streaming_port" lineno="83432"> <summary> Do not audit attempts to send UDP traffic on the streaming port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_streaming_port" lineno="83451"> <summary> Receive UDP traffic on the streaming port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_streaming_port" lineno="83470"> <summary> Do not audit attempts to receive UDP traffic on the streaming port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_streaming_port" lineno="83489"> <summary> Send and receive UDP traffic on the streaming port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_streaming_port" lineno="83506"> <summary> Do not audit attempts to send and receive UDP traffic on the streaming port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_streaming_port" lineno="83522"> <summary> Bind TCP sockets to the streaming port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_streaming_port" lineno="83542"> <summary> Bind UDP sockets to the streaming port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_streaming_port" lineno="83561"> <summary> Make a TCP connection to the streaming port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_streaming_client_packets" lineno="83581"> <summary> Send streaming_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_streaming_client_packets" lineno="83600"> <summary> Do not audit attempts to send streaming_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_streaming_client_packets" lineno="83619"> <summary> Receive streaming_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_streaming_client_packets" lineno="83638"> <summary> Do not audit attempts to receive streaming_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_streaming_client_packets" lineno="83657"> <summary> Send and receive streaming_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_streaming_client_packets" lineno="83673"> <summary> Do not audit attempts to send and receive streaming_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_streaming_client_packets" lineno="83688"> <summary> Relabel packets to streaming_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_streaming_server_packets" lineno="83708"> <summary> Send streaming_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_streaming_server_packets" lineno="83727"> <summary> Do not audit attempts to send streaming_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_streaming_server_packets" lineno="83746"> <summary> Receive streaming_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_streaming_server_packets" lineno="83765"> <summary> Do not audit attempts to receive streaming_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_streaming_server_packets" lineno="83784"> <summary> Send and receive streaming_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_streaming_server_packets" lineno="83800"> <summary> Do not audit attempts to send and receive streaming_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_streaming_server_packets" lineno="83815"> <summary> Relabel packets to streaming_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_svn_port" lineno="83837"> <summary> Send and receive TCP traffic on the svn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_svn_port" lineno="83856"> <summary> Send UDP traffic on the svn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_svn_port" lineno="83875"> <summary> Do not audit attempts to send UDP traffic on the svn port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_svn_port" lineno="83894"> <summary> Receive UDP traffic on the svn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_svn_port" lineno="83913"> <summary> Do not audit attempts to receive UDP traffic on the svn port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_svn_port" lineno="83932"> <summary> Send and receive UDP traffic on the svn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="83949"> <summary> Do not audit attempts to send and receive UDP traffic on the svn port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_svn_port" lineno="83965"> <summary> Bind TCP sockets to the svn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_svn_port" lineno="83985"> <summary> Bind UDP sockets to the svn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_svn_port" lineno="84004"> <summary> Make a TCP connection to the svn port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_svn_client_packets" lineno="84024"> <summary> Send svn_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_svn_client_packets" lineno="84043"> <summary> Do not audit attempts to send svn_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_svn_client_packets" lineno="84062"> <summary> Receive svn_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_svn_client_packets" lineno="84081"> <summary> Do not audit attempts to receive svn_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_svn_client_packets" lineno="84100"> <summary> Send and receive svn_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="84116"> <summary> Do not audit attempts to send and receive svn_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_svn_client_packets" lineno="84131"> <summary> Relabel packets to svn_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_svn_server_packets" lineno="84151"> <summary> Send svn_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_svn_server_packets" lineno="84170"> <summary> Do not audit attempts to send svn_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_svn_server_packets" lineno="84189"> <summary> Receive svn_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_svn_server_packets" lineno="84208"> <summary> Do not audit attempts to receive svn_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_svn_server_packets" lineno="84227"> <summary> Send and receive svn_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="84243"> <summary> Do not audit attempts to send and receive svn_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_svn_server_packets" lineno="84258"> <summary> Relabel packets to svn_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_swat_port" lineno="84280"> <summary> Send and receive TCP traffic on the swat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_swat_port" lineno="84299"> <summary> Send UDP traffic on the swat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_swat_port" lineno="84318"> <summary> Do not audit attempts to send UDP traffic on the swat port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_swat_port" lineno="84337"> <summary> Receive UDP traffic on the swat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_swat_port" lineno="84356"> <summary> Do not audit attempts to receive UDP traffic on the swat port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_swat_port" lineno="84375"> <summary> Send and receive UDP traffic on the swat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="84392"> <summary> Do not audit attempts to send and receive UDP traffic on the swat port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_swat_port" lineno="84408"> <summary> Bind TCP sockets to the swat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_swat_port" lineno="84428"> <summary> Bind UDP sockets to the swat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_swat_port" lineno="84447"> <summary> Make a TCP connection to the swat port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_swat_client_packets" lineno="84467"> <summary> Send swat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_swat_client_packets" lineno="84486"> <summary> Do not audit attempts to send swat_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_swat_client_packets" lineno="84505"> <summary> Receive swat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_swat_client_packets" lineno="84524"> <summary> Do not audit attempts to receive swat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_swat_client_packets" lineno="84543"> <summary> Send and receive swat_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="84559"> <summary> Do not audit attempts to send and receive swat_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_swat_client_packets" lineno="84574"> <summary> Relabel packets to swat_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_swat_server_packets" lineno="84594"> <summary> Send swat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_swat_server_packets" lineno="84613"> <summary> Do not audit attempts to send swat_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_swat_server_packets" lineno="84632"> <summary> Receive swat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_swat_server_packets" lineno="84651"> <summary> Do not audit attempts to receive swat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_swat_server_packets" lineno="84670"> <summary> Send and receive swat_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="84686"> <summary> Do not audit attempts to send and receive swat_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_swat_server_packets" lineno="84701"> <summary> Relabel packets to swat_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_sype_port" lineno="84723"> <summary> Send and receive TCP traffic on the sype port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_sype_port" lineno="84742"> <summary> Send UDP traffic on the sype port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_sype_port" lineno="84761"> <summary> Do not audit attempts to send UDP traffic on the sype port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_sype_port" lineno="84780"> <summary> Receive UDP traffic on the sype port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_sype_port" lineno="84799"> <summary> Do not audit attempts to receive UDP traffic on the sype port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_sype_port" lineno="84818"> <summary> Send and receive UDP traffic on the sype port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_sype_port" lineno="84835"> <summary> Do not audit attempts to send and receive UDP traffic on the sype port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_sype_port" lineno="84851"> <summary> Bind TCP sockets to the sype port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_sype_port" lineno="84871"> <summary> Bind UDP sockets to the sype port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_sype_port" lineno="84890"> <summary> Make a TCP connection to the sype port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sype_client_packets" lineno="84910"> <summary> Send sype_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sype_client_packets" lineno="84929"> <summary> Do not audit attempts to send sype_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sype_client_packets" lineno="84948"> <summary> Receive sype_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sype_client_packets" lineno="84967"> <summary> Do not audit attempts to receive sype_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sype_client_packets" lineno="84986"> <summary> Send and receive sype_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sype_client_packets" lineno="85002"> <summary> Do not audit attempts to send and receive sype_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sype_client_packets" lineno="85017"> <summary> Relabel packets to sype_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_sype_server_packets" lineno="85037"> <summary> Send sype_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_sype_server_packets" lineno="85056"> <summary> Do not audit attempts to send sype_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_sype_server_packets" lineno="85075"> <summary> Receive sype_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_sype_server_packets" lineno="85094"> <summary> Do not audit attempts to receive sype_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_sype_server_packets" lineno="85113"> <summary> Send and receive sype_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_sype_server_packets" lineno="85129"> <summary> Do not audit attempts to send and receive sype_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_sype_server_packets" lineno="85144"> <summary> Relabel packets to sype_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_syslogd_port" lineno="85166"> <summary> Send and receive TCP traffic on the syslogd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_syslogd_port" lineno="85185"> <summary> Send UDP traffic on the syslogd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="85204"> <summary> Do not audit attempts to send UDP traffic on the syslogd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_syslogd_port" lineno="85223"> <summary> Receive UDP traffic on the syslogd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="85242"> <summary> Do not audit attempts to receive UDP traffic on the syslogd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_syslogd_port" lineno="85261"> <summary> Send and receive UDP traffic on the syslogd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="85278"> <summary> Do not audit attempts to send and receive UDP traffic on the syslogd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_syslogd_port" lineno="85294"> <summary> Bind TCP sockets to the syslogd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_syslogd_port" lineno="85314"> <summary> Bind UDP sockets to the syslogd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_syslogd_port" lineno="85333"> <summary> Make a TCP connection to the syslogd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_syslogd_client_packets" lineno="85353"> <summary> Send syslogd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="85372"> <summary> Do not audit attempts to send syslogd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_syslogd_client_packets" lineno="85391"> <summary> Receive syslogd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="85410"> <summary> Do not audit attempts to receive syslogd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_syslogd_client_packets" lineno="85429"> <summary> Send and receive syslogd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="85445"> <summary> Do not audit attempts to send and receive syslogd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_syslogd_client_packets" lineno="85460"> <summary> Relabel packets to syslogd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_syslogd_server_packets" lineno="85480"> <summary> Send syslogd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="85499"> <summary> Do not audit attempts to send syslogd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_syslogd_server_packets" lineno="85518"> <summary> Receive syslogd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="85537"> <summary> Do not audit attempts to receive syslogd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_syslogd_server_packets" lineno="85556"> <summary> Send and receive syslogd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="85572"> <summary> Do not audit attempts to send and receive syslogd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_syslogd_server_packets" lineno="85587"> <summary> Relabel packets to syslogd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_telnetd_port" lineno="85609"> <summary> Send and receive TCP traffic on the telnetd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_telnetd_port" lineno="85628"> <summary> Send UDP traffic on the telnetd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="85647"> <summary> Do not audit attempts to send UDP traffic on the telnetd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_telnetd_port" lineno="85666"> <summary> Receive UDP traffic on the telnetd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="85685"> <summary> Do not audit attempts to receive UDP traffic on the telnetd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_telnetd_port" lineno="85704"> <summary> Send and receive UDP traffic on the telnetd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="85721"> <summary> Do not audit attempts to send and receive UDP traffic on the telnetd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_telnetd_port" lineno="85737"> <summary> Bind TCP sockets to the telnetd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_telnetd_port" lineno="85757"> <summary> Bind UDP sockets to the telnetd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_telnetd_port" lineno="85776"> <summary> Make a TCP connection to the telnetd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_telnetd_client_packets" lineno="85796"> <summary> Send telnetd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="85815"> <summary> Do not audit attempts to send telnetd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_telnetd_client_packets" lineno="85834"> <summary> Receive telnetd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="85853"> <summary> Do not audit attempts to receive telnetd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_telnetd_client_packets" lineno="85872"> <summary> Send and receive telnetd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="85888"> <summary> Do not audit attempts to send and receive telnetd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_telnetd_client_packets" lineno="85903"> <summary> Relabel packets to telnetd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_telnetd_server_packets" lineno="85923"> <summary> Send telnetd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="85942"> <summary> Do not audit attempts to send telnetd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_telnetd_server_packets" lineno="85961"> <summary> Receive telnetd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="85980"> <summary> Do not audit attempts to receive telnetd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_telnetd_server_packets" lineno="85999"> <summary> Send and receive telnetd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="86015"> <summary> Do not audit attempts to send and receive telnetd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_telnetd_server_packets" lineno="86030"> <summary> Relabel packets to telnetd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_tftp_port" lineno="86052"> <summary> Send and receive TCP traffic on the tftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_tftp_port" lineno="86071"> <summary> Send UDP traffic on the tftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_tftp_port" lineno="86090"> <summary> Do not audit attempts to send UDP traffic on the tftp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_tftp_port" lineno="86109"> <summary> Receive UDP traffic on the tftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="86128"> <summary> Do not audit attempts to receive UDP traffic on the tftp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_tftp_port" lineno="86147"> <summary> Send and receive UDP traffic on the tftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="86164"> <summary> Do not audit attempts to send and receive UDP traffic on the tftp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_tftp_port" lineno="86180"> <summary> Bind TCP sockets to the tftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_tftp_port" lineno="86200"> <summary> Bind UDP sockets to the tftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_tftp_port" lineno="86219"> <summary> Make a TCP connection to the tftp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_tftp_client_packets" lineno="86239"> <summary> Send tftp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_tftp_client_packets" lineno="86258"> <summary> Do not audit attempts to send tftp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_tftp_client_packets" lineno="86277"> <summary> Receive tftp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="86296"> <summary> Do not audit attempts to receive tftp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_tftp_client_packets" lineno="86315"> <summary> Send and receive tftp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="86331"> <summary> Do not audit attempts to send and receive tftp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_tftp_client_packets" lineno="86346"> <summary> Relabel packets to tftp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_tftp_server_packets" lineno="86366"> <summary> Send tftp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_tftp_server_packets" lineno="86385"> <summary> Do not audit attempts to send tftp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_tftp_server_packets" lineno="86404"> <summary> Receive tftp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="86423"> <summary> Do not audit attempts to receive tftp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_tftp_server_packets" lineno="86442"> <summary> Send and receive tftp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="86458"> <summary> Do not audit attempts to send and receive tftp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_tftp_server_packets" lineno="86473"> <summary> Relabel packets to tftp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_tor_port" lineno="86495"> <summary> Send and receive TCP traffic on the tor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_tor_port" lineno="86514"> <summary> Send UDP traffic on the tor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_tor_port" lineno="86533"> <summary> Do not audit attempts to send UDP traffic on the tor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_tor_port" lineno="86552"> <summary> Receive UDP traffic on the tor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_tor_port" lineno="86571"> <summary> Do not audit attempts to receive UDP traffic on the tor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_tor_port" lineno="86590"> <summary> Send and receive UDP traffic on the tor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="86607"> <summary> Do not audit attempts to send and receive UDP traffic on the tor port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_tor_port" lineno="86623"> <summary> Bind TCP sockets to the tor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_tor_port" lineno="86643"> <summary> Bind UDP sockets to the tor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_tor_port" lineno="86662"> <summary> Make a TCP connection to the tor port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_tor_client_packets" lineno="86682"> <summary> Send tor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_tor_client_packets" lineno="86701"> <summary> Do not audit attempts to send tor_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_tor_client_packets" lineno="86720"> <summary> Receive tor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_tor_client_packets" lineno="86739"> <summary> Do not audit attempts to receive tor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_tor_client_packets" lineno="86758"> <summary> Send and receive tor_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="86774"> <summary> Do not audit attempts to send and receive tor_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_tor_client_packets" lineno="86789"> <summary> Relabel packets to tor_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_tor_server_packets" lineno="86809"> <summary> Send tor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_tor_server_packets" lineno="86828"> <summary> Do not audit attempts to send tor_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_tor_server_packets" lineno="86847"> <summary> Receive tor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_tor_server_packets" lineno="86866"> <summary> Do not audit attempts to receive tor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_tor_server_packets" lineno="86885"> <summary> Send and receive tor_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="86901"> <summary> Do not audit attempts to send and receive tor_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_tor_server_packets" lineno="86916"> <summary> Relabel packets to tor_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_tor_socks_port" lineno="86938"> <summary> Send and receive TCP traffic on the tor_socks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_tor_socks_port" lineno="86957"> <summary> Send UDP traffic on the tor_socks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_tor_socks_port" lineno="86976"> <summary> Do not audit attempts to send UDP traffic on the tor_socks port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_tor_socks_port" lineno="86995"> <summary> Receive UDP traffic on the tor_socks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_tor_socks_port" lineno="87014"> <summary> Do not audit attempts to receive UDP traffic on the tor_socks port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_tor_socks_port" lineno="87033"> <summary> Send and receive UDP traffic on the tor_socks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_tor_socks_port" lineno="87050"> <summary> Do not audit attempts to send and receive UDP traffic on the tor_socks port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_tor_socks_port" lineno="87066"> <summary> Bind TCP sockets to the tor_socks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_tor_socks_port" lineno="87086"> <summary> Bind UDP sockets to the tor_socks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_tor_socks_port" lineno="87105"> <summary> Make a TCP connection to the tor_socks port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_tor_socks_client_packets" lineno="87125"> <summary> Send tor_socks_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_tor_socks_client_packets" lineno="87144"> <summary> Do not audit attempts to send tor_socks_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_tor_socks_client_packets" lineno="87163"> <summary> Receive tor_socks_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_tor_socks_client_packets" lineno="87182"> <summary> Do not audit attempts to receive tor_socks_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_tor_socks_client_packets" lineno="87201"> <summary> Send and receive tor_socks_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_tor_socks_client_packets" lineno="87217"> <summary> Do not audit attempts to send and receive tor_socks_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_tor_socks_client_packets" lineno="87232"> <summary> Relabel packets to tor_socks_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_tor_socks_server_packets" lineno="87252"> <summary> Send tor_socks_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_tor_socks_server_packets" lineno="87271"> <summary> Do not audit attempts to send tor_socks_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_tor_socks_server_packets" lineno="87290"> <summary> Receive tor_socks_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_tor_socks_server_packets" lineno="87309"> <summary> Do not audit attempts to receive tor_socks_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_tor_socks_server_packets" lineno="87328"> <summary> Send and receive tor_socks_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_tor_socks_server_packets" lineno="87344"> <summary> Do not audit attempts to send and receive tor_socks_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_tor_socks_server_packets" lineno="87359"> <summary> Relabel packets to tor_socks_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_traceroute_port" lineno="87381"> <summary> Send and receive TCP traffic on the traceroute port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_traceroute_port" lineno="87400"> <summary> Send UDP traffic on the traceroute port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="87419"> <summary> Do not audit attempts to send UDP traffic on the traceroute port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_traceroute_port" lineno="87438"> <summary> Receive UDP traffic on the traceroute port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="87457"> <summary> Do not audit attempts to receive UDP traffic on the traceroute port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_traceroute_port" lineno="87476"> <summary> Send and receive UDP traffic on the traceroute port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="87493"> <summary> Do not audit attempts to send and receive UDP traffic on the traceroute port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_traceroute_port" lineno="87509"> <summary> Bind TCP sockets to the traceroute port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_traceroute_port" lineno="87529"> <summary> Bind UDP sockets to the traceroute port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_traceroute_port" lineno="87548"> <summary> Make a TCP connection to the traceroute port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_traceroute_client_packets" lineno="87568"> <summary> Send traceroute_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="87587"> <summary> Do not audit attempts to send traceroute_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_traceroute_client_packets" lineno="87606"> <summary> Receive traceroute_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="87625"> <summary> Do not audit attempts to receive traceroute_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_traceroute_client_packets" lineno="87644"> <summary> Send and receive traceroute_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="87660"> <summary> Do not audit attempts to send and receive traceroute_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_traceroute_client_packets" lineno="87675"> <summary> Relabel packets to traceroute_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_traceroute_server_packets" lineno="87695"> <summary> Send traceroute_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="87714"> <summary> Do not audit attempts to send traceroute_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_traceroute_server_packets" lineno="87733"> <summary> Receive traceroute_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="87752"> <summary> Do not audit attempts to receive traceroute_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_traceroute_server_packets" lineno="87771"> <summary> Send and receive traceroute_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="87787"> <summary> Do not audit attempts to send and receive traceroute_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_traceroute_server_packets" lineno="87802"> <summary> Relabel packets to traceroute_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_transproxy_port" lineno="87824"> <summary> Send and receive TCP traffic on the transproxy port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_transproxy_port" lineno="87843"> <summary> Send UDP traffic on the transproxy port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="87862"> <summary> Do not audit attempts to send UDP traffic on the transproxy port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_transproxy_port" lineno="87881"> <summary> Receive UDP traffic on the transproxy port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="87900"> <summary> Do not audit attempts to receive UDP traffic on the transproxy port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_transproxy_port" lineno="87919"> <summary> Send and receive UDP traffic on the transproxy port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="87936"> <summary> Do not audit attempts to send and receive UDP traffic on the transproxy port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_transproxy_port" lineno="87952"> <summary> Bind TCP sockets to the transproxy port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_transproxy_port" lineno="87972"> <summary> Bind UDP sockets to the transproxy port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_transproxy_port" lineno="87991"> <summary> Make a TCP connection to the transproxy port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_transproxy_client_packets" lineno="88011"> <summary> Send transproxy_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="88030"> <summary> Do not audit attempts to send transproxy_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_transproxy_client_packets" lineno="88049"> <summary> Receive transproxy_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="88068"> <summary> Do not audit attempts to receive transproxy_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_transproxy_client_packets" lineno="88087"> <summary> Send and receive transproxy_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="88103"> <summary> Do not audit attempts to send and receive transproxy_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_transproxy_client_packets" lineno="88118"> <summary> Relabel packets to transproxy_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_transproxy_server_packets" lineno="88138"> <summary> Send transproxy_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="88157"> <summary> Do not audit attempts to send transproxy_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_transproxy_server_packets" lineno="88176"> <summary> Receive transproxy_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="88195"> <summary> Do not audit attempts to receive transproxy_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_transproxy_server_packets" lineno="88214"> <summary> Send and receive transproxy_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="88230"> <summary> Do not audit attempts to send and receive transproxy_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_transproxy_server_packets" lineno="88245"> <summary> Relabel packets to transproxy_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_ups_port" lineno="88267"> <summary> Send and receive TCP traffic on the ups port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_ups_port" lineno="88286"> <summary> Send UDP traffic on the ups port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_ups_port" lineno="88305"> <summary> Do not audit attempts to send UDP traffic on the ups port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_ups_port" lineno="88324"> <summary> Receive UDP traffic on the ups port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_ups_port" lineno="88343"> <summary> Do not audit attempts to receive UDP traffic on the ups port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_ups_port" lineno="88362"> <summary> Send and receive UDP traffic on the ups port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="88379"> <summary> Do not audit attempts to send and receive UDP traffic on the ups port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_ups_port" lineno="88395"> <summary> Bind TCP sockets to the ups port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_ups_port" lineno="88415"> <summary> Bind UDP sockets to the ups port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_ups_port" lineno="88434"> <summary> Make a TCP connection to the ups port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ups_client_packets" lineno="88454"> <summary> Send ups_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ups_client_packets" lineno="88473"> <summary> Do not audit attempts to send ups_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ups_client_packets" lineno="88492"> <summary> Receive ups_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ups_client_packets" lineno="88511"> <summary> Do not audit attempts to receive ups_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ups_client_packets" lineno="88530"> <summary> Send and receive ups_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="88546"> <summary> Do not audit attempts to send and receive ups_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ups_client_packets" lineno="88561"> <summary> Relabel packets to ups_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_ups_server_packets" lineno="88581"> <summary> Send ups_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_ups_server_packets" lineno="88600"> <summary> Do not audit attempts to send ups_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_ups_server_packets" lineno="88619"> <summary> Receive ups_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_ups_server_packets" lineno="88638"> <summary> Do not audit attempts to receive ups_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_ups_server_packets" lineno="88657"> <summary> Send and receive ups_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="88673"> <summary> Do not audit attempts to send and receive ups_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_ups_server_packets" lineno="88688"> <summary> Relabel packets to ups_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_uucpd_port" lineno="88710"> <summary> Send and receive TCP traffic on the uucpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_uucpd_port" lineno="88729"> <summary> Send UDP traffic on the uucpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="88748"> <summary> Do not audit attempts to send UDP traffic on the uucpd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_uucpd_port" lineno="88767"> <summary> Receive UDP traffic on the uucpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="88786"> <summary> Do not audit attempts to receive UDP traffic on the uucpd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_uucpd_port" lineno="88805"> <summary> Send and receive UDP traffic on the uucpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="88822"> <summary> Do not audit attempts to send and receive UDP traffic on the uucpd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_uucpd_port" lineno="88838"> <summary> Bind TCP sockets to the uucpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_uucpd_port" lineno="88858"> <summary> Bind UDP sockets to the uucpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_uucpd_port" lineno="88877"> <summary> Make a TCP connection to the uucpd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_uucpd_client_packets" lineno="88897"> <summary> Send uucpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="88916"> <summary> Do not audit attempts to send uucpd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_uucpd_client_packets" lineno="88935"> <summary> Receive uucpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="88954"> <summary> Do not audit attempts to receive uucpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_uucpd_client_packets" lineno="88973"> <summary> Send and receive uucpd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="88989"> <summary> Do not audit attempts to send and receive uucpd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_uucpd_client_packets" lineno="89004"> <summary> Relabel packets to uucpd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_uucpd_server_packets" lineno="89024"> <summary> Send uucpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="89043"> <summary> Do not audit attempts to send uucpd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_uucpd_server_packets" lineno="89062"> <summary> Receive uucpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="89081"> <summary> Do not audit attempts to receive uucpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_uucpd_server_packets" lineno="89100"> <summary> Send and receive uucpd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="89116"> <summary> Do not audit attempts to send and receive uucpd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_uucpd_server_packets" lineno="89131"> <summary> Relabel packets to uucpd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_varnishd_port" lineno="89153"> <summary> Send and receive TCP traffic on the varnishd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_varnishd_port" lineno="89172"> <summary> Send UDP traffic on the varnishd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="89191"> <summary> Do not audit attempts to send UDP traffic on the varnishd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_varnishd_port" lineno="89210"> <summary> Receive UDP traffic on the varnishd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="89229"> <summary> Do not audit attempts to receive UDP traffic on the varnishd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_varnishd_port" lineno="89248"> <summary> Send and receive UDP traffic on the varnishd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="89265"> <summary> Do not audit attempts to send and receive UDP traffic on the varnishd port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_varnishd_port" lineno="89281"> <summary> Bind TCP sockets to the varnishd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_varnishd_port" lineno="89301"> <summary> Bind UDP sockets to the varnishd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_varnishd_port" lineno="89320"> <summary> Make a TCP connection to the varnishd port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_varnishd_client_packets" lineno="89340"> <summary> Send varnishd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="89359"> <summary> Do not audit attempts to send varnishd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_varnishd_client_packets" lineno="89378"> <summary> Receive varnishd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="89397"> <summary> Do not audit attempts to receive varnishd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_varnishd_client_packets" lineno="89416"> <summary> Send and receive varnishd_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="89432"> <summary> Do not audit attempts to send and receive varnishd_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_varnishd_client_packets" lineno="89447"> <summary> Relabel packets to varnishd_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_varnishd_server_packets" lineno="89467"> <summary> Send varnishd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="89486"> <summary> Do not audit attempts to send varnishd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_varnishd_server_packets" lineno="89505"> <summary> Receive varnishd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="89524"> <summary> Do not audit attempts to receive varnishd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_varnishd_server_packets" lineno="89543"> <summary> Send and receive varnishd_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="89559"> <summary> Do not audit attempts to send and receive varnishd_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_varnishd_server_packets" lineno="89574"> <summary> Relabel packets to varnishd_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_virt_port" lineno="89596"> <summary> Send and receive TCP traffic on the virt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_virt_port" lineno="89615"> <summary> Send UDP traffic on the virt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_virt_port" lineno="89634"> <summary> Do not audit attempts to send UDP traffic on the virt port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_virt_port" lineno="89653"> <summary> Receive UDP traffic on the virt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_virt_port" lineno="89672"> <summary> Do not audit attempts to receive UDP traffic on the virt port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_virt_port" lineno="89691"> <summary> Send and receive UDP traffic on the virt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="89708"> <summary> Do not audit attempts to send and receive UDP traffic on the virt port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_virt_port" lineno="89724"> <summary> Bind TCP sockets to the virt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_virt_port" lineno="89744"> <summary> Bind UDP sockets to the virt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_virt_port" lineno="89763"> <summary> Make a TCP connection to the virt port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_virt_client_packets" lineno="89783"> <summary> Send virt_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_virt_client_packets" lineno="89802"> <summary> Do not audit attempts to send virt_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_virt_client_packets" lineno="89821"> <summary> Receive virt_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_virt_client_packets" lineno="89840"> <summary> Do not audit attempts to receive virt_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_virt_client_packets" lineno="89859"> <summary> Send and receive virt_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="89875"> <summary> Do not audit attempts to send and receive virt_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_virt_client_packets" lineno="89890"> <summary> Relabel packets to virt_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_virt_server_packets" lineno="89910"> <summary> Send virt_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_virt_server_packets" lineno="89929"> <summary> Do not audit attempts to send virt_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_virt_server_packets" lineno="89948"> <summary> Receive virt_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_virt_server_packets" lineno="89967"> <summary> Do not audit attempts to receive virt_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_virt_server_packets" lineno="89986"> <summary> Send and receive virt_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="90002"> <summary> Do not audit attempts to send and receive virt_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_virt_server_packets" lineno="90017"> <summary> Relabel packets to virt_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="90039"> <summary> Send and receive TCP traffic on the virt_migration port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_virt_migration_port" lineno="90058"> <summary> Send UDP traffic on the virt_migration port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="90077"> <summary> Do not audit attempts to send UDP traffic on the virt_migration port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_virt_migration_port" lineno="90096"> <summary> Receive UDP traffic on the virt_migration port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="90115"> <summary> Do not audit attempts to receive UDP traffic on the virt_migration port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_virt_migration_port" lineno="90134"> <summary> Send and receive UDP traffic on the virt_migration port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="90151"> <summary> Do not audit attempts to send and receive UDP traffic on the virt_migration port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_virt_migration_port" lineno="90167"> <summary> Bind TCP sockets to the virt_migration port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_virt_migration_port" lineno="90187"> <summary> Bind UDP sockets to the virt_migration port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_virt_migration_port" lineno="90206"> <summary> Make a TCP connection to the virt_migration port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_virt_migration_client_packets" lineno="90226"> <summary> Send virt_migration_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="90245"> <summary> Do not audit attempts to send virt_migration_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_virt_migration_client_packets" lineno="90264"> <summary> Receive virt_migration_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="90283"> <summary> Do not audit attempts to receive virt_migration_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_virt_migration_client_packets" lineno="90302"> <summary> Send and receive virt_migration_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="90318"> <summary> Do not audit attempts to send and receive virt_migration_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_virt_migration_client_packets" lineno="90333"> <summary> Relabel packets to virt_migration_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_virt_migration_server_packets" lineno="90353"> <summary> Send virt_migration_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="90372"> <summary> Do not audit attempts to send virt_migration_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_virt_migration_server_packets" lineno="90391"> <summary> Receive virt_migration_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="90410"> <summary> Do not audit attempts to receive virt_migration_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_virt_migration_server_packets" lineno="90429"> <summary> Send and receive virt_migration_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="90445"> <summary> Do not audit attempts to send and receive virt_migration_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_virt_migration_server_packets" lineno="90460"> <summary> Relabel packets to virt_migration_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_vnc_port" lineno="90482"> <summary> Send and receive TCP traffic on the vnc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_vnc_port" lineno="90501"> <summary> Send UDP traffic on the vnc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_vnc_port" lineno="90520"> <summary> Do not audit attempts to send UDP traffic on the vnc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_vnc_port" lineno="90539"> <summary> Receive UDP traffic on the vnc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="90558"> <summary> Do not audit attempts to receive UDP traffic on the vnc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_vnc_port" lineno="90577"> <summary> Send and receive UDP traffic on the vnc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="90594"> <summary> Do not audit attempts to send and receive UDP traffic on the vnc port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_vnc_port" lineno="90610"> <summary> Bind TCP sockets to the vnc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_vnc_port" lineno="90630"> <summary> Bind UDP sockets to the vnc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_vnc_port" lineno="90649"> <summary> Make a TCP connection to the vnc port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_vnc_client_packets" lineno="90669"> <summary> Send vnc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_vnc_client_packets" lineno="90688"> <summary> Do not audit attempts to send vnc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_vnc_client_packets" lineno="90707"> <summary> Receive vnc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="90726"> <summary> Do not audit attempts to receive vnc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_vnc_client_packets" lineno="90745"> <summary> Send and receive vnc_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="90761"> <summary> Do not audit attempts to send and receive vnc_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_vnc_client_packets" lineno="90776"> <summary> Relabel packets to vnc_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_vnc_server_packets" lineno="90796"> <summary> Send vnc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_vnc_server_packets" lineno="90815"> <summary> Do not audit attempts to send vnc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_vnc_server_packets" lineno="90834"> <summary> Receive vnc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="90853"> <summary> Do not audit attempts to receive vnc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_vnc_server_packets" lineno="90872"> <summary> Send and receive vnc_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="90888"> <summary> Do not audit attempts to send and receive vnc_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_vnc_server_packets" lineno="90903"> <summary> Relabel packets to vnc_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_wccp_port" lineno="90925"> <summary> Send and receive TCP traffic on the wccp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_wccp_port" lineno="90944"> <summary> Send UDP traffic on the wccp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_wccp_port" lineno="90963"> <summary> Do not audit attempts to send UDP traffic on the wccp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_wccp_port" lineno="90982"> <summary> Receive UDP traffic on the wccp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="91001"> <summary> Do not audit attempts to receive UDP traffic on the wccp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_wccp_port" lineno="91020"> <summary> Send and receive UDP traffic on the wccp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="91037"> <summary> Do not audit attempts to send and receive UDP traffic on the wccp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_wccp_port" lineno="91053"> <summary> Bind TCP sockets to the wccp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_wccp_port" lineno="91073"> <summary> Bind UDP sockets to the wccp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_wccp_port" lineno="91092"> <summary> Make a TCP connection to the wccp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_wccp_client_packets" lineno="91112"> <summary> Send wccp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_wccp_client_packets" lineno="91131"> <summary> Do not audit attempts to send wccp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_wccp_client_packets" lineno="91150"> <summary> Receive wccp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="91169"> <summary> Do not audit attempts to receive wccp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_wccp_client_packets" lineno="91188"> <summary> Send and receive wccp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="91204"> <summary> Do not audit attempts to send and receive wccp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_wccp_client_packets" lineno="91219"> <summary> Relabel packets to wccp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_wccp_server_packets" lineno="91239"> <summary> Send wccp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_wccp_server_packets" lineno="91258"> <summary> Do not audit attempts to send wccp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_wccp_server_packets" lineno="91277"> <summary> Receive wccp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="91296"> <summary> Do not audit attempts to receive wccp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_wccp_server_packets" lineno="91315"> <summary> Send and receive wccp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="91331"> <summary> Do not audit attempts to send and receive wccp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_wccp_server_packets" lineno="91346"> <summary> Relabel packets to wccp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_websm_port" lineno="91368"> <summary> Send and receive TCP traffic on the websm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_websm_port" lineno="91387"> <summary> Send UDP traffic on the websm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_websm_port" lineno="91406"> <summary> Do not audit attempts to send UDP traffic on the websm port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_websm_port" lineno="91425"> <summary> Receive UDP traffic on the websm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_websm_port" lineno="91444"> <summary> Do not audit attempts to receive UDP traffic on the websm port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_websm_port" lineno="91463"> <summary> Send and receive UDP traffic on the websm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="91480"> <summary> Do not audit attempts to send and receive UDP traffic on the websm port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_websm_port" lineno="91496"> <summary> Bind TCP sockets to the websm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_websm_port" lineno="91516"> <summary> Bind UDP sockets to the websm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_websm_port" lineno="91535"> <summary> Make a TCP connection to the websm port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_websm_client_packets" lineno="91555"> <summary> Send websm_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_websm_client_packets" lineno="91574"> <summary> Do not audit attempts to send websm_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_websm_client_packets" lineno="91593"> <summary> Receive websm_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_websm_client_packets" lineno="91612"> <summary> Do not audit attempts to receive websm_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_websm_client_packets" lineno="91631"> <summary> Send and receive websm_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="91647"> <summary> Do not audit attempts to send and receive websm_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_websm_client_packets" lineno="91662"> <summary> Relabel packets to websm_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_websm_server_packets" lineno="91682"> <summary> Send websm_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_websm_server_packets" lineno="91701"> <summary> Do not audit attempts to send websm_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_websm_server_packets" lineno="91720"> <summary> Receive websm_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_websm_server_packets" lineno="91739"> <summary> Do not audit attempts to receive websm_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_websm_server_packets" lineno="91758"> <summary> Send and receive websm_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="91774"> <summary> Do not audit attempts to send and receive websm_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_websm_server_packets" lineno="91789"> <summary> Relabel packets to websm_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_whois_port" lineno="91811"> <summary> Send and receive TCP traffic on the whois port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_whois_port" lineno="91830"> <summary> Send UDP traffic on the whois port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_whois_port" lineno="91849"> <summary> Do not audit attempts to send UDP traffic on the whois port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_whois_port" lineno="91868"> <summary> Receive UDP traffic on the whois port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_whois_port" lineno="91887"> <summary> Do not audit attempts to receive UDP traffic on the whois port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_whois_port" lineno="91906"> <summary> Send and receive UDP traffic on the whois port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="91923"> <summary> Do not audit attempts to send and receive UDP traffic on the whois port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_whois_port" lineno="91939"> <summary> Bind TCP sockets to the whois port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_whois_port" lineno="91959"> <summary> Bind UDP sockets to the whois port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_whois_port" lineno="91978"> <summary> Make a TCP connection to the whois port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_whois_client_packets" lineno="91998"> <summary> Send whois_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_whois_client_packets" lineno="92017"> <summary> Do not audit attempts to send whois_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_whois_client_packets" lineno="92036"> <summary> Receive whois_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_whois_client_packets" lineno="92055"> <summary> Do not audit attempts to receive whois_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_whois_client_packets" lineno="92074"> <summary> Send and receive whois_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="92090"> <summary> Do not audit attempts to send and receive whois_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_whois_client_packets" lineno="92105"> <summary> Relabel packets to whois_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_whois_server_packets" lineno="92125"> <summary> Send whois_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_whois_server_packets" lineno="92144"> <summary> Do not audit attempts to send whois_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_whois_server_packets" lineno="92163"> <summary> Receive whois_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_whois_server_packets" lineno="92182"> <summary> Do not audit attempts to receive whois_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_whois_server_packets" lineno="92201"> <summary> Send and receive whois_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="92217"> <summary> Do not audit attempts to send and receive whois_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_whois_server_packets" lineno="92232"> <summary> Relabel packets to whois_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_winshadow_port" lineno="92254"> <summary> Send and receive TCP traffic on the winshadow port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_winshadow_port" lineno="92273"> <summary> Send UDP traffic on the winshadow port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="92292"> <summary> Do not audit attempts to send UDP traffic on the winshadow port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_winshadow_port" lineno="92311"> <summary> Receive UDP traffic on the winshadow port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="92330"> <summary> Do not audit attempts to receive UDP traffic on the winshadow port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_winshadow_port" lineno="92349"> <summary> Send and receive UDP traffic on the winshadow port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="92366"> <summary> Do not audit attempts to send and receive UDP traffic on the winshadow port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_winshadow_port" lineno="92382"> <summary> Bind TCP sockets to the winshadow port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_winshadow_port" lineno="92402"> <summary> Bind UDP sockets to the winshadow port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_winshadow_port" lineno="92421"> <summary> Make a TCP connection to the winshadow port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_winshadow_client_packets" lineno="92441"> <summary> Send winshadow_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="92460"> <summary> Do not audit attempts to send winshadow_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_winshadow_client_packets" lineno="92479"> <summary> Receive winshadow_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="92498"> <summary> Do not audit attempts to receive winshadow_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_winshadow_client_packets" lineno="92517"> <summary> Send and receive winshadow_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="92533"> <summary> Do not audit attempts to send and receive winshadow_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_winshadow_client_packets" lineno="92548"> <summary> Relabel packets to winshadow_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_winshadow_server_packets" lineno="92568"> <summary> Send winshadow_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="92587"> <summary> Do not audit attempts to send winshadow_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_winshadow_server_packets" lineno="92606"> <summary> Receive winshadow_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="92625"> <summary> Do not audit attempts to receive winshadow_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_winshadow_server_packets" lineno="92644"> <summary> Send and receive winshadow_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="92660"> <summary> Do not audit attempts to send and receive winshadow_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_winshadow_server_packets" lineno="92675"> <summary> Relabel packets to winshadow_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="92697"> <summary> Send and receive TCP traffic on the xdmcp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_xdmcp_port" lineno="92716"> <summary> Send UDP traffic on the xdmcp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="92735"> <summary> Do not audit attempts to send UDP traffic on the xdmcp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_xdmcp_port" lineno="92754"> <summary> Receive UDP traffic on the xdmcp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="92773"> <summary> Do not audit attempts to receive UDP traffic on the xdmcp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_xdmcp_port" lineno="92792"> <summary> Send and receive UDP traffic on the xdmcp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="92809"> <summary> Do not audit attempts to send and receive UDP traffic on the xdmcp port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_xdmcp_port" lineno="92825"> <summary> Bind TCP sockets to the xdmcp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_xdmcp_port" lineno="92845"> <summary> Bind UDP sockets to the xdmcp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_xdmcp_port" lineno="92864"> <summary> Make a TCP connection to the xdmcp port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_xdmcp_client_packets" lineno="92884"> <summary> Send xdmcp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="92903"> <summary> Do not audit attempts to send xdmcp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_xdmcp_client_packets" lineno="92922"> <summary> Receive xdmcp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="92941"> <summary> Do not audit attempts to receive xdmcp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_xdmcp_client_packets" lineno="92960"> <summary> Send and receive xdmcp_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="92976"> <summary> Do not audit attempts to send and receive xdmcp_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_xdmcp_client_packets" lineno="92991"> <summary> Relabel packets to xdmcp_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_xdmcp_server_packets" lineno="93011"> <summary> Send xdmcp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="93030"> <summary> Do not audit attempts to send xdmcp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_xdmcp_server_packets" lineno="93049"> <summary> Receive xdmcp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="93068"> <summary> Do not audit attempts to receive xdmcp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_xdmcp_server_packets" lineno="93087"> <summary> Send and receive xdmcp_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="93103"> <summary> Do not audit attempts to send and receive xdmcp_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_xdmcp_server_packets" lineno="93118"> <summary> Relabel packets to xdmcp_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_xen_port" lineno="93140"> <summary> Send and receive TCP traffic on the xen port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_xen_port" lineno="93159"> <summary> Send UDP traffic on the xen port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_xen_port" lineno="93178"> <summary> Do not audit attempts to send UDP traffic on the xen port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_xen_port" lineno="93197"> <summary> Receive UDP traffic on the xen port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_xen_port" lineno="93216"> <summary> Do not audit attempts to receive UDP traffic on the xen port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_xen_port" lineno="93235"> <summary> Send and receive UDP traffic on the xen port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="93252"> <summary> Do not audit attempts to send and receive UDP traffic on the xen port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_xen_port" lineno="93268"> <summary> Bind TCP sockets to the xen port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_xen_port" lineno="93288"> <summary> Bind UDP sockets to the xen port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_xen_port" lineno="93307"> <summary> Make a TCP connection to the xen port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_xen_client_packets" lineno="93327"> <summary> Send xen_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_xen_client_packets" lineno="93346"> <summary> Do not audit attempts to send xen_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_xen_client_packets" lineno="93365"> <summary> Receive xen_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_xen_client_packets" lineno="93384"> <summary> Do not audit attempts to receive xen_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_xen_client_packets" lineno="93403"> <summary> Send and receive xen_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="93419"> <summary> Do not audit attempts to send and receive xen_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_xen_client_packets" lineno="93434"> <summary> Relabel packets to xen_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_xen_server_packets" lineno="93454"> <summary> Send xen_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_xen_server_packets" lineno="93473"> <summary> Do not audit attempts to send xen_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_xen_server_packets" lineno="93492"> <summary> Receive xen_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_xen_server_packets" lineno="93511"> <summary> Do not audit attempts to receive xen_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_xen_server_packets" lineno="93530"> <summary> Send and receive xen_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="93546"> <summary> Do not audit attempts to send and receive xen_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_xen_server_packets" lineno="93561"> <summary> Relabel packets to xen_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_xfs_port" lineno="93583"> <summary> Send and receive TCP traffic on the xfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_xfs_port" lineno="93602"> <summary> Send UDP traffic on the xfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_xfs_port" lineno="93621"> <summary> Do not audit attempts to send UDP traffic on the xfs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_xfs_port" lineno="93640"> <summary> Receive UDP traffic on the xfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="93659"> <summary> Do not audit attempts to receive UDP traffic on the xfs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_xfs_port" lineno="93678"> <summary> Send and receive UDP traffic on the xfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="93695"> <summary> Do not audit attempts to send and receive UDP traffic on the xfs port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_xfs_port" lineno="93711"> <summary> Bind TCP sockets to the xfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_xfs_port" lineno="93731"> <summary> Bind UDP sockets to the xfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_xfs_port" lineno="93750"> <summary> Make a TCP connection to the xfs port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_xfs_client_packets" lineno="93770"> <summary> Send xfs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_xfs_client_packets" lineno="93789"> <summary> Do not audit attempts to send xfs_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_xfs_client_packets" lineno="93808"> <summary> Receive xfs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="93827"> <summary> Do not audit attempts to receive xfs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_xfs_client_packets" lineno="93846"> <summary> Send and receive xfs_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="93862"> <summary> Do not audit attempts to send and receive xfs_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_xfs_client_packets" lineno="93877"> <summary> Relabel packets to xfs_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_xfs_server_packets" lineno="93897"> <summary> Send xfs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_xfs_server_packets" lineno="93916"> <summary> Do not audit attempts to send xfs_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_xfs_server_packets" lineno="93935"> <summary> Receive xfs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="93954"> <summary> Do not audit attempts to receive xfs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_xfs_server_packets" lineno="93973"> <summary> Send and receive xfs_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="93989"> <summary> Do not audit attempts to send and receive xfs_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_xfs_server_packets" lineno="94004"> <summary> Relabel packets to xfs_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_xserver_port" lineno="94026"> <summary> Send and receive TCP traffic on the xserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_xserver_port" lineno="94045"> <summary> Send UDP traffic on the xserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_xserver_port" lineno="94064"> <summary> Do not audit attempts to send UDP traffic on the xserver port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_xserver_port" lineno="94083"> <summary> Receive UDP traffic on the xserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="94102"> <summary> Do not audit attempts to receive UDP traffic on the xserver port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_xserver_port" lineno="94121"> <summary> Send and receive UDP traffic on the xserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="94138"> <summary> Do not audit attempts to send and receive UDP traffic on the xserver port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_xserver_port" lineno="94154"> <summary> Bind TCP sockets to the xserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_xserver_port" lineno="94174"> <summary> Bind UDP sockets to the xserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_xserver_port" lineno="94193"> <summary> Make a TCP connection to the xserver port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_xserver_client_packets" lineno="94213"> <summary> Send xserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_xserver_client_packets" lineno="94232"> <summary> Do not audit attempts to send xserver_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_xserver_client_packets" lineno="94251"> <summary> Receive xserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="94270"> <summary> Do not audit attempts to receive xserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_xserver_client_packets" lineno="94289"> <summary> Send and receive xserver_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="94305"> <summary> Do not audit attempts to send and receive xserver_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_xserver_client_packets" lineno="94320"> <summary> Relabel packets to xserver_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_xserver_server_packets" lineno="94340"> <summary> Send xserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_xserver_server_packets" lineno="94359"> <summary> Do not audit attempts to send xserver_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_xserver_server_packets" lineno="94378"> <summary> Receive xserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="94397"> <summary> Do not audit attempts to receive xserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_xserver_server_packets" lineno="94416"> <summary> Send and receive xserver_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="94432"> <summary> Do not audit attempts to send and receive xserver_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_xserver_server_packets" lineno="94447"> <summary> Relabel packets to xserver_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_zarafa_port" lineno="94469"> <summary> Send and receive TCP traffic on the zarafa port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_zarafa_port" lineno="94488"> <summary> Send UDP traffic on the zarafa port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="94507"> <summary> Do not audit attempts to send UDP traffic on the zarafa port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_zarafa_port" lineno="94526"> <summary> Receive UDP traffic on the zarafa port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="94545"> <summary> Do not audit attempts to receive UDP traffic on the zarafa port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_zarafa_port" lineno="94564"> <summary> Send and receive UDP traffic on the zarafa port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="94581"> <summary> Do not audit attempts to send and receive UDP traffic on the zarafa port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_zarafa_port" lineno="94597"> <summary> Bind TCP sockets to the zarafa port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_zarafa_port" lineno="94617"> <summary> Bind UDP sockets to the zarafa port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_zarafa_port" lineno="94636"> <summary> Make a TCP connection to the zarafa port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zarafa_client_packets" lineno="94656"> <summary> Send zarafa_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="94675"> <summary> Do not audit attempts to send zarafa_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zarafa_client_packets" lineno="94694"> <summary> Receive zarafa_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="94713"> <summary> Do not audit attempts to receive zarafa_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zarafa_client_packets" lineno="94732"> <summary> Send and receive zarafa_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="94748"> <summary> Do not audit attempts to send and receive zarafa_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zarafa_client_packets" lineno="94763"> <summary> Relabel packets to zarafa_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zarafa_server_packets" lineno="94783"> <summary> Send zarafa_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="94802"> <summary> Do not audit attempts to send zarafa_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zarafa_server_packets" lineno="94821"> <summary> Receive zarafa_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="94840"> <summary> Do not audit attempts to receive zarafa_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zarafa_server_packets" lineno="94859"> <summary> Send and receive zarafa_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="94875"> <summary> Do not audit attempts to send and receive zarafa_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zarafa_server_packets" lineno="94890"> <summary> Relabel packets to zarafa_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_zabbix_port" lineno="94912"> <summary> Send and receive TCP traffic on the zabbix port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_zabbix_port" lineno="94931"> <summary> Send UDP traffic on the zabbix port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="94950"> <summary> Do not audit attempts to send UDP traffic on the zabbix port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_zabbix_port" lineno="94969"> <summary> Receive UDP traffic on the zabbix port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="94988"> <summary> Do not audit attempts to receive UDP traffic on the zabbix port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_zabbix_port" lineno="95007"> <summary> Send and receive UDP traffic on the zabbix port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="95024"> <summary> Do not audit attempts to send and receive UDP traffic on the zabbix port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_zabbix_port" lineno="95040"> <summary> Bind TCP sockets to the zabbix port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_zabbix_port" lineno="95060"> <summary> Bind UDP sockets to the zabbix port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_zabbix_port" lineno="95079"> <summary> Make a TCP connection to the zabbix port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zabbix_client_packets" lineno="95099"> <summary> Send zabbix_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="95118"> <summary> Do not audit attempts to send zabbix_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zabbix_client_packets" lineno="95137"> <summary> Receive zabbix_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="95156"> <summary> Do not audit attempts to receive zabbix_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zabbix_client_packets" lineno="95175"> <summary> Send and receive zabbix_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="95191"> <summary> Do not audit attempts to send and receive zabbix_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zabbix_client_packets" lineno="95206"> <summary> Relabel packets to zabbix_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zabbix_server_packets" lineno="95226"> <summary> Send zabbix_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="95245"> <summary> Do not audit attempts to send zabbix_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zabbix_server_packets" lineno="95264"> <summary> Receive zabbix_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="95283"> <summary> Do not audit attempts to receive zabbix_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zabbix_server_packets" lineno="95302"> <summary> Send and receive zabbix_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="95318"> <summary> Do not audit attempts to send and receive zabbix_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zabbix_server_packets" lineno="95333"> <summary> Relabel packets to zabbix_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="95355"> <summary> Send and receive TCP traffic on the zabbix_agent port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_zabbix_agent_port" lineno="95374"> <summary> Send UDP traffic on the zabbix_agent port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="95393"> <summary> Do not audit attempts to send UDP traffic on the zabbix_agent port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_zabbix_agent_port" lineno="95412"> <summary> Receive UDP traffic on the zabbix_agent port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="95431"> <summary> Do not audit attempts to receive UDP traffic on the zabbix_agent port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="95450"> <summary> Send and receive UDP traffic on the zabbix_agent port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="95467"> <summary> Do not audit attempts to send and receive UDP traffic on the zabbix_agent port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_zabbix_agent_port" lineno="95483"> <summary> Bind TCP sockets to the zabbix_agent port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_zabbix_agent_port" lineno="95503"> <summary> Bind UDP sockets to the zabbix_agent port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_zabbix_agent_port" lineno="95522"> <summary> Make a TCP connection to the zabbix_agent port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zabbix_agent_client_packets" lineno="95542"> <summary> Send zabbix_agent_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="95561"> <summary> Do not audit attempts to send zabbix_agent_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zabbix_agent_client_packets" lineno="95580"> <summary> Receive zabbix_agent_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="95599"> <summary> Do not audit attempts to receive zabbix_agent_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="95618"> <summary> Send and receive zabbix_agent_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="95634"> <summary> Do not audit attempts to send and receive zabbix_agent_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="95649"> <summary> Relabel packets to zabbix_agent_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zabbix_agent_server_packets" lineno="95669"> <summary> Send zabbix_agent_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="95688"> <summary> Do not audit attempts to send zabbix_agent_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zabbix_agent_server_packets" lineno="95707"> <summary> Receive zabbix_agent_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="95726"> <summary> Do not audit attempts to receive zabbix_agent_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="95745"> <summary> Send and receive zabbix_agent_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="95761"> <summary> Do not audit attempts to send and receive zabbix_agent_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="95776"> <summary> Relabel packets to zabbix_agent_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_zebra_port" lineno="95798"> <summary> Send and receive TCP traffic on the zebra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_zebra_port" lineno="95817"> <summary> Send UDP traffic on the zebra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_zebra_port" lineno="95836"> <summary> Do not audit attempts to send UDP traffic on the zebra port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_zebra_port" lineno="95855"> <summary> Receive UDP traffic on the zebra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="95874"> <summary> Do not audit attempts to receive UDP traffic on the zebra port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_zebra_port" lineno="95893"> <summary> Send and receive UDP traffic on the zebra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="95910"> <summary> Do not audit attempts to send and receive UDP traffic on the zebra port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_zebra_port" lineno="95926"> <summary> Bind TCP sockets to the zebra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_zebra_port" lineno="95946"> <summary> Bind UDP sockets to the zebra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_zebra_port" lineno="95965"> <summary> Make a TCP connection to the zebra port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zebra_client_packets" lineno="95985"> <summary> Send zebra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zebra_client_packets" lineno="96004"> <summary> Do not audit attempts to send zebra_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zebra_client_packets" lineno="96023"> <summary> Receive zebra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="96042"> <summary> Do not audit attempts to receive zebra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zebra_client_packets" lineno="96061"> <summary> Send and receive zebra_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="96077"> <summary> Do not audit attempts to send and receive zebra_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zebra_client_packets" lineno="96092"> <summary> Relabel packets to zebra_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zebra_server_packets" lineno="96112"> <summary> Send zebra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zebra_server_packets" lineno="96131"> <summary> Do not audit attempts to send zebra_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zebra_server_packets" lineno="96150"> <summary> Receive zebra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="96169"> <summary> Do not audit attempts to receive zebra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zebra_server_packets" lineno="96188"> <summary> Send and receive zebra_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="96204"> <summary> Do not audit attempts to send and receive zebra_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zebra_server_packets" lineno="96219"> <summary> Relabel packets to zebra_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_zented_port" lineno="96241"> <summary> Send and receive TCP traffic on the zented port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_zented_port" lineno="96260"> <summary> Send UDP traffic on the zented port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_zented_port" lineno="96279"> <summary> Do not audit attempts to send UDP traffic on the zented port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_zented_port" lineno="96298"> <summary> Receive UDP traffic on the zented port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_zented_port" lineno="96317"> <summary> Do not audit attempts to receive UDP traffic on the zented port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_zented_port" lineno="96336"> <summary> Send and receive UDP traffic on the zented port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="96353"> <summary> Do not audit attempts to send and receive UDP traffic on the zented port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_zented_port" lineno="96369"> <summary> Bind TCP sockets to the zented port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_zented_port" lineno="96389"> <summary> Bind UDP sockets to the zented port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_zented_port" lineno="96408"> <summary> Make a TCP connection to the zented port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zented_client_packets" lineno="96428"> <summary> Send zented_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zented_client_packets" lineno="96447"> <summary> Do not audit attempts to send zented_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zented_client_packets" lineno="96466"> <summary> Receive zented_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zented_client_packets" lineno="96485"> <summary> Do not audit attempts to receive zented_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zented_client_packets" lineno="96504"> <summary> Send and receive zented_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="96520"> <summary> Do not audit attempts to send and receive zented_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zented_client_packets" lineno="96535"> <summary> Relabel packets to zented_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zented_server_packets" lineno="96555"> <summary> Send zented_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zented_server_packets" lineno="96574"> <summary> Do not audit attempts to send zented_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zented_server_packets" lineno="96593"> <summary> Receive zented_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zented_server_packets" lineno="96612"> <summary> Do not audit attempts to receive zented_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zented_server_packets" lineno="96631"> <summary> Send and receive zented_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="96647"> <summary> Do not audit attempts to send and receive zented_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zented_server_packets" lineno="96662"> <summary> Relabel packets to zented_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_zope_port" lineno="96684"> <summary> Send and receive TCP traffic on the zope port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_zope_port" lineno="96703"> <summary> Send UDP traffic on the zope port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_send_zope_port" lineno="96722"> <summary> Do not audit attempts to send UDP traffic on the zope port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_receive_zope_port" lineno="96741"> <summary> Receive UDP traffic on the zope port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_receive_zope_port" lineno="96760"> <summary> Do not audit attempts to receive UDP traffic on the zope port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_sendrecv_zope_port" lineno="96779"> <summary> Send and receive UDP traffic on the zope port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="96796"> <summary> Do not audit attempts to send and receive UDP traffic on the zope port. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_bind_zope_port" lineno="96812"> <summary> Bind TCP sockets to the zope port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_udp_bind_zope_port" lineno="96832"> <summary> Bind UDP sockets to the zope port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_tcp_connect_zope_port" lineno="96851"> <summary> Make a TCP connection to the zope port. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zope_client_packets" lineno="96871"> <summary> Send zope_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zope_client_packets" lineno="96890"> <summary> Do not audit attempts to send zope_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zope_client_packets" lineno="96909"> <summary> Receive zope_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zope_client_packets" lineno="96928"> <summary> Do not audit attempts to receive zope_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zope_client_packets" lineno="96947"> <summary> Send and receive zope_client packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="96963"> <summary> Do not audit attempts to send and receive zope_client packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zope_client_packets" lineno="96978"> <summary> Relabel packets to zope_client the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_send_zope_server_packets" lineno="96998"> <summary> Send zope_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_dontaudit_send_zope_server_packets" lineno="97017"> <summary> Do not audit attempts to send zope_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_receive_zope_server_packets" lineno="97036"> <summary> Receive zope_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_dontaudit_receive_zope_server_packets" lineno="97055"> <summary> Do not audit attempts to receive zope_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_sendrecv_zope_server_packets" lineno="97074"> <summary> Send and receive zope_server packets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="97090"> <summary> Do not audit attempts to send and receive zope_server packets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <infoflow type="none"/> </interface> <interface name="corenet_relabelto_zope_server_packets" lineno="97105"> <summary> Relabel packets to zope_server the packet type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="corenet_tcp_sendrecv_lo_if" lineno="97128"> <summary> Send and receive TCP network traffic on the lo interface. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_udp_send_lo_if" lineno="97147"> <summary> Send UDP network traffic on the lo interface. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_udp_receive_lo_if" lineno="97166"> <summary> Receive UDP network traffic on the lo interface. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_udp_sendrecv_lo_if" lineno="97185"> <summary> Send and receive UDP network traffic on the lo interface. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> <interface name="corenet_raw_send_lo_if" lineno="97201"> <summary> Send raw IP packets on the lo interface. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="corenet_raw_receive_lo_if" lineno="97220"> <summary> Receive raw IP packets on the lo interface. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="corenet_raw_sendrecv_lo_if" lineno="97239"> <summary> Send and receive raw IP packets on the lo interface. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="both" weight="10"/> </interface> </module> <module name="devices" filename="policy/modules/kernel/devices.if"> <summary> Device nodes and interfaces for many basic system devices. </summary> <desc> <p> This module creates the device node concept and provides the policy for many of the device files. Notable exceptions are the mass storage and terminal devices that are covered by other modules. </p> <p> This module creates the concept of a device node. That is a char or block device file, usually in /dev. All types that are used to label device nodes should use the dev_node macro. </p> <p> Additionally, this module controls access to three things: <ul> <li>the device directories containing device nodes</li> <li>device nodes as a group</li> <li>individual access to specific device nodes covered by this module.</li> </ul> </p> </desc> <required val="true"> Depended on by other required modules. </required> <interface name="dev_node" lineno="66"> <summary> Make the specified type usable for device nodes in a filesystem. </summary> <desc> <p> Make the specified type usable for device nodes in a filesystem. Types used for device nodes that do not use this interface, or an interface that calls this one, will have unexpected behaviors while the system is running. </p> <p> Example: </p> <p> type mydev_t; dev_node(mydev_t) allow mydomain_t mydev_t:chr_file read_chr_file_perms; </p> <p> Related interfaces: </p> <ul> <li>term_tty()</li> <li>term_pty()</li> </ul> </desc> <param name="type"> <summary> Type to be used for device nodes. </summary> </param> <infoflow type="none"/> </interface> <interface name="dev_getattr_fs" lineno="84"> <summary> Get attributes of device filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_mounton" lineno="102"> <summary> Mount a filesystem on /dev </summary> <param name="domain"> <summary> Domain allow access. </summary> </param> </interface> <interface name="dev_relabel_all_dev_nodes" lineno="121"> <summary> Allow full relabeling (to and from) of all device nodes. </summary> <param name="domain"> <summary> Domain allowed to relabel. </summary> </param> <rolecap/> </interface> <interface name="dev_list_all_dev_nodes" lineno="146"> <summary> List all of the device nodes in a device directory. </summary> <param name="domain"> <summary> Domain allowed to list device nodes. </summary> </param> </interface> <interface name="dev_setattr_generic_dirs" lineno="165"> <summary> Set the attributes of /dev directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_list_all_dev_nodes" lineno="183"> <summary> Dontaudit attempts to list all device nodes. </summary> <param name="domain"> <summary> Domain to dontaudit listing of device nodes. </summary> </param> </interface> <interface name="dev_add_entry_generic_dirs" lineno="201"> <summary> Add entries to directories in /dev. </summary> <param name="domain"> <summary> Domain allowed to add entries. </summary> </param> </interface> <interface name="dev_remove_entry_generic_dirs" lineno="219"> <summary> Add entries to directories in /dev. </summary> <param name="domain"> <summary> Domain allowed to add entries. </summary> </param> </interface> <interface name="dev_create_generic_dirs" lineno="237"> <summary> Create a directory in the device directory. </summary> <param name="domain"> <summary> Domain allowed to create the directory. </summary> </param> </interface> <interface name="dev_delete_generic_dirs" lineno="256"> <summary> Delete a directory in the device directory. </summary> <param name="domain"> <summary> Domain allowed to create the directory. </summary> </param> </interface> <interface name="dev_manage_generic_dirs" lineno="274"> <summary> Manage of directories in /dev. </summary> <param name="domain"> <summary> Domain allowed to relabel. </summary> </param> </interface> <interface name="dev_relabel_generic_dev_dirs" lineno="292"> <summary> Allow full relabeling (to and from) of directories in /dev. </summary> <param name="domain"> <summary> Domain allowed to relabel. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_generic_files" lineno="310"> <summary> dontaudit getattr generic files in /dev. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_rw_generic_files" lineno="328"> <summary> Read and write generic files in /dev. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_delete_generic_files" lineno="346"> <summary> Delete generic files in /dev. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_manage_generic_files" lineno="364"> <summary> Create a file in the device directory. </summary> <param name="domain"> <summary> Domain allowed to create the files. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_generic_pipes" lineno="382"> <summary> Dontaudit getattr on generic pipes. </summary> <param name="domain"> <summary> Domain to dontaudit. </summary> </param> </interface> <interface name="dev_getattr_generic_blk_files" lineno="400"> <summary> Allow getattr on generic block devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_generic_blk_files" lineno="418"> <summary> Dontaudit getattr on generic block devices. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_dontaudit_setattr_generic_blk_files" lineno="436"> <summary> Dontaudit setattr on generic block devices. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_create_generic_blk_files" lineno="454"> <summary> Create generic block device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_delete_generic_blk_files" lineno="472"> <summary> Delete generic block device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_generic_chr_files" lineno="490"> <summary> Allow getattr for generic character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_generic_chr_files" lineno="508"> <summary> Dontaudit getattr for generic character device files. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_dontaudit_read_generic_chr_files" lineno="526"> <summary> Dontaudit read for generic character device files. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_dontaudit_read_generic_blk_files" lineno="544"> <summary> Dontaudit read for generic character device files. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_dontaudit_setattr_generic_chr_files" lineno="562"> <summary> Dontaudit setattr for generic character device files. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_rw_generic_chr_files" lineno="580"> <summary> Read and write generic character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_create_generic_chr_files" lineno="598"> <summary> Create generic character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_delete_generic_chr_files" lineno="616"> <summary> Delete generic character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_setattr_generic_symlinks" lineno="635"> <summary> Do not audit attempts to set the attributes of symbolic links in device directories (/dev). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_read_generic_symlinks" lineno="653"> <summary> Read symbolic links in device directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_create_generic_symlinks" lineno="671"> <summary> Create symbolic links in device directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_delete_generic_symlinks" lineno="689"> <summary> Delete symbolic links in device directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_manage_generic_symlinks" lineno="707"> <summary> Create, delete, read, and write symbolic links in device directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_relabel_generic_symlinks" lineno="725"> <summary> Relabel symbolic links in device directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_manage_all_dev_nodes" lineno="743"> <summary> Create, delete, read, and write device nodes in device directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_rw_generic_dev_nodes" lineno="779"> <summary> Dontaudit getattr for generic device files. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_dontaudit_rw_all_dev_nodes" lineno="797"> <summary> Dontaudit getattr for generic device files. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_manage_generic_blk_files" lineno="815"> <summary> Create, delete, read, and write block device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_manage_generic_chr_files" lineno="833"> <summary> Create, delete, read, and write character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_filetrans" lineno="863"> <summary> Create, read, and write device nodes. The node will be transitioned to the type provided. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="file"> <summary> Type to which the created node will be transitioned. </summary> </param> <param name="objectclass(es)"> <summary> Object class(es) (single or set including {}) for which this the transition will occur. </summary> </param> </interface> <interface name="dev_tmpfs_filetrans_dev" lineno="893"> <summary> Create, read, and write device nodes. The node will be transitioned to the type provided. This is a temporary interface until devtmpfs functionality fixed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="objectclass(es)"> <summary> Object class(es) (single or set including {}) for which this the transition will occur. </summary> </param> </interface> <interface name="dev_getattr_all_blk_files" lineno="912"> <summary> Getattr on all block file device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="dev_dontaudit_getattr_all_blk_files" lineno="931"> <summary> Dontaudit getattr on all block file device nodes. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_getattr_all_chr_files" lineno="951"> <summary> Getattr on all character file device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="dev_dontaudit_getattr_all_chr_files" lineno="970"> <summary> Dontaudit getattr on all character file device nodes. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_all" lineno="989"> <summary> Dontaudit getattr on all device nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_setattr_all_blk_files" lineno="1009"> <summary> Setattr on all block file device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="dev_setattr_all_chr_files" lineno="1029"> <summary> Setattr on all character file device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="dev_dontaudit_read_all_blk_files" lineno="1048"> <summary> Dontaudit read on all block file device nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_dontaudit_write_all_blk_files" lineno="1066"> <summary> Dontaudit write on all block file device nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_dontaudit_read_all_chr_files" lineno="1084"> <summary> Dontaudit read on all character file device nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_dontaudit_write_all_chr_files" lineno="1102"> <summary> Dontaudit write on all character file device nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_create_all_blk_files" lineno="1120"> <summary> Create all block device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_create_all_chr_files" lineno="1139"> <summary> Create all character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_all_inherited_chr_files" lineno="1158"> <summary> rw all inherited character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_all_inherited_blk_files" lineno="1176"> <summary> rw all inherited blk device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_delete_all_blk_files" lineno="1194"> <summary> Delete all block device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_delete_all_chr_files" lineno="1213"> <summary> Delete all character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rename_all_blk_files" lineno="1232"> <summary> Rename all block device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rename_all_chr_files" lineno="1251"> <summary> Rename all character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_manage_all_blk_files" lineno="1270"> <summary> Read, write, create, and delete all block device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_manage_all_chr_files" lineno="1294"> <summary> Read, write, create, and delete all character device files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_agp_dev" lineno="1315"> <summary> Getattr the agp devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_agp" lineno="1333"> <summary> Read and write the agp devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_apm_bios_dev" lineno="1351"> <summary> Get the attributes of the apm bios device node. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_apm_bios_dev" lineno="1370"> <summary> Do not audit attempts to get the attributes of the apm bios device node. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_setattr_apm_bios_dev" lineno="1388"> <summary> Set the attributes of the apm bios device node. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_setattr_apm_bios_dev" lineno="1407"> <summary> Do not audit attempts to set the attributes of the apm bios device node. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_rw_apm_bios" lineno="1425"> <summary> Read and write the apm bios. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_autofs_dev" lineno="1443"> <summary> Get the attributes of the autofs device node. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_autofs_dev" lineno="1462"> <summary> Do not audit attempts to get the attributes of the autofs device node. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_setattr_autofs_dev" lineno="1480"> <summary> Set the attributes of the autofs device node. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_setattr_autofs_dev" lineno="1499"> <summary> Do not audit attempts to set the attributes of the autofs device node. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_rw_autofs" lineno="1517"> <summary> Read and write the autofs device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_cardmgr" lineno="1535"> <summary> Read and write the PCMCIA card manager device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_rw_cardmgr" lineno="1555"> <summary> Do not audit attempts to read and write the PCMCIA card manager device. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_create_cardmgr_dev" lineno="1575"> <summary> Create, read, write, and delete the PCMCIA card manager device with the correct type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_manage_cardmgr_dev" lineno="1595"> <summary> Create, read, write, and delete the PCMCIA card manager device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_filetrans_cardmgr" lineno="1616"> <summary> Automatic type transition to the type for PCMCIA card manager device nodes when created in /dev. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_cpu_dev" lineno="1635"> <summary> Get the attributes of the CPU microcode and id interfaces. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_cpu_dev" lineno="1654"> <summary> Set the attributes of the CPU microcode and id interfaces. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_cpuid" lineno="1672"> <summary> Read the CPU identity. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_cpu_microcode" lineno="1691"> <summary> Read and write the the CPU microcode device. This is required to load CPU microcode. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_crash" lineno="1709"> <summary> Read the kernel crash device </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_crypto" lineno="1727"> <summary> Read and write the the hardware SSL accelerator. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_dlm_control" lineno="1745"> <summary> Set the attributes of the dlm control devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_dlm_control" lineno="1763"> <summary> Read and write the the dlm control device </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_dri_dev" lineno="1781"> <summary> getattr the dri devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_dri_dev" lineno="1799"> <summary> Setattr the dri devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_dri" lineno="1817"> <summary> Read and write the dri devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_rw_dri" lineno="1835"> <summary> Dontaudit read and write on the dri devices. </summary> <param name="domain"> <summary> Domain to dontaudit access. </summary> </param> </interface> <interface name="dev_manage_dri_dev" lineno="1853"> <summary> Create, read, write, and delete the dri devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_filetrans_dri" lineno="1872"> <summary> Automatic type transition to the type for DRI device nodes when created in /dev. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_input_dev" lineno="1890"> <summary> Get the attributes of the event devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_input_dev" lineno="1909"> <summary> Set the attributes of the event devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_input" lineno="1928"> <summary> Read input event devices (/dev/input). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_input_dev" lineno="1946"> <summary> Read input event devices (/dev/input). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_framebuffer_dev" lineno="1964"> <summary> Get the attributes of the framebuffer device node. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_framebuffer_dev" lineno="1982"> <summary> Set the attributes of the framebuffer device node. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2001"> <summary> Dot not audit attempts to set the attributes of the framebuffer device node. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_read_framebuffer" lineno="2019"> <summary> Read the framebuffer. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_read_framebuffer" lineno="2038"> <summary> Do not audit attempts to read the framebuffer. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_framebuffer" lineno="2056"> <summary> Write the framebuffer. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_framebuffer" lineno="2074"> <summary> Read and write the framebuffer. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_kmsg" lineno="2092"> <summary> Read the kernel messages </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_read_kmsg" lineno="2110"> <summary> Do not audit attempts to read the kernel messages </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_write_kmsg" lineno="2128"> <summary> Write to the kernel messages device </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_ksm_dev" lineno="2146"> <summary> Get the attributes of the ksm devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_ksm_dev" lineno="2164"> <summary> Set the attributes of the ksm devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_ksm" lineno="2182"> <summary> Read the ksm devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_ksm" lineno="2200"> <summary> Read and write to ksm devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_kvm_dev" lineno="2218"> <summary> Get the attributes of the kvm devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_kvm_dev" lineno="2236"> <summary> Set the attributes of the kvm devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_kvm" lineno="2254"> <summary> Read the kvm devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_kvm" lineno="2272"> <summary> Read and write to kvm devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_lirc" lineno="2290"> <summary> Read the lirc device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_lirc" lineno="2308"> <summary> Read and write the lirc device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_filetrans_lirc" lineno="2327"> <summary> Automatic type transition to the type for lirc device nodes when created in /dev. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_lvm_control" lineno="2345"> <summary> Get the attributes of the lvm comtrol device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_lvm_control" lineno="2363"> <summary> Read the lvm comtrol device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_lvm_control" lineno="2381"> <summary> Read and write the lvm control device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_rw_lvm_control" lineno="2399"> <summary> Do not audit attempts to read and write lvm control device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_delete_lvm_control_dev" lineno="2417"> <summary> Delete the lvm control device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_memory_dev" lineno="2435"> <summary> dontaudit getattr raw memory devices (e.g. /dev/mem). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_raw_memory" lineno="2453"> <summary> Read raw memory devices (e.g. /dev/mem). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_read_raw_memory" lineno="2476"> <summary> Do not audit attempts to read raw memory devices (e.g. /dev/mem). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_write_raw_memory" lineno="2494"> <summary> Write raw memory devices (e.g. /dev/mem). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rx_raw_memory" lineno="2516"> <summary> Read and execute raw memory devices (e.g. /dev/mem). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_wx_raw_memory" lineno="2535"> <summary> Write and execute raw memory devices (e.g. /dev/mem). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_misc_dev" lineno="2554"> <summary> Get the attributes of miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_misc_dev" lineno="2573"> <summary> Do not audit attempts to get the attributes of miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_misc_dev" lineno="2591"> <summary> Set the attributes of miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_setattr_misc_dev" lineno="2610"> <summary> Do not audit attempts to set the attributes of miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_misc" lineno="2628"> <summary> Read miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_ipmi_dev" lineno="2646"> <summary> Read and write ipmi devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_misc" lineno="2664"> <summary> Write miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_rw_misc" lineno="2682"> <summary> Do not audit attempts to read and write miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_modem_dev" lineno="2700"> <summary> Get the attributes of the modem devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_modem_dev" lineno="2718"> <summary> Set the attributes of the modem devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_modem" lineno="2736"> <summary> Read the modem devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_modem" lineno="2754"> <summary> Read and write to modem devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_mouse_dev" lineno="2772"> <summary> Get the attributes of the mouse devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_mouse_dev" lineno="2790"> <summary> Set the attributes of the mouse devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_mouse" lineno="2808"> <summary> Read the mouse devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_mouse" lineno="2826"> <summary> Read and write to mouse devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_mtrr_dev" lineno="2845"> <summary> Get the attributes of the memory type range registers (MTRR) device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_mtrr_dev" lineno="2865"> <summary> Dontaudit get the attributes of the memory type range registers (MTRR) device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_mtrr" lineno="2898"> <summary> Read the memory type range registers (MTRR). (Deprecated) </summary> <desc> <p> Read the memory type range registers (MTRR). This interface has been deprecated, dev_rw_mtrr() should be used instead. </p> <p> The MTRR device ioctls can be used for reading and writing; thus, read access to the device cannot be separated from write access. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_mtrr" lineno="2927"> <summary> Write the memory type range registers (MTRR). (Deprecated) </summary> <desc> <p> Write the memory type range registers (MTRR). This interface has been deprecated, dev_rw_mtrr() should be used instead. </p> <p> The MTRR device ioctls can be used for reading and writing; thus, write access to the device cannot be separated from read access. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_write_mtrr" lineno="2943"> <summary> Do not audit attempts to write the memory type range registers (MTRR). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_rw_mtrr" lineno="2962"> <summary> Read and write the memory type range registers (MTRR). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_netcontrol_dev" lineno="2981"> <summary> Get the attributes of the network control device </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_netcontrol" lineno="2999"> <summary> Read the network control identity. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_netcontrol" lineno="3017"> <summary> Read and write the the network control device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_null_dev" lineno="3035"> <summary> Get the attributes of the null device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_null_dev" lineno="3053"> <summary> Set the attributes of the null device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_delete_null" lineno="3071"> <summary> Delete the null device (/dev/null). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_null" lineno="3089"> <summary> Read and write to the null device (/dev/null). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_create_null_dev" lineno="3107"> <summary> Create the null device (/dev/null). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_nvram_dev" lineno="3126"> <summary> Do not audit attempts to get the attributes of the BIOS non-volatile RAM device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_nvram" lineno="3144"> <summary> Read and write BIOS non-volatile RAM. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_printer_dev" lineno="3163"> <summary> Get the attributes of the printer device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_printer_dev" lineno="3181"> <summary> Set the attributes of the printer device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_append_printer" lineno="3200"> <summary> Append the printer device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_printer" lineno="3218"> <summary> Read and write the printer device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_qemu_dev" lineno="3237"> <summary> Get the attributes of the QEMU microcode and id interfaces. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_qemu_dev" lineno="3256"> <summary> Set the attributes of the QEMU microcode and id interfaces. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_qemu" lineno="3274"> <summary> Read the QEMU device </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_qemu" lineno="3292"> <summary> Read and write the the QEMU device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_rand" lineno="3326"> <summary> Read from random number generator devices (e.g., /dev/random). </summary> <desc> <p> Allow the specified domain to read from random number generator devices (e.g., /dev/random). Typically this is used in situations when a cryptographically secure random number is needed. </p> <p> Related interface: </p> <ul> <li>dev_read_urand()</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="dev_dontaudit_read_rand" lineno="3345"> <summary> Do not audit attempts to read from random number generator devices (e.g., /dev/random) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_append_rand" lineno="3364"> <summary> Do not audit attempts to append to random number generator devices (e.g., /dev/random) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_rand" lineno="3384"> <summary> Write to the random device (e.g., /dev/random). This adds entropy used to generate the random data read from the random device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_realtime_clock" lineno="3402"> <summary> Read the realtime clock (/dev/rtc). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_realtime_clock" lineno="3420"> <summary> Set the realtime clock (/dev/rtc). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_realtime_clock" lineno="3440"> <summary> Read and set the realtime clock (/dev/rtc). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_scanner_dev" lineno="3455"> <summary> Get the attributes of the scanner device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_scanner_dev" lineno="3474"> <summary> Do not audit attempts to get the attributes of the scanner device. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_setattr_scanner_dev" lineno="3492"> <summary> Set the attributes of the scanner device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_setattr_scanner_dev" lineno="3511"> <summary> Do not audit attempts to set the attributes of the scanner device. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_rw_scanner" lineno="3529"> <summary> Read and write the scanner device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_sound_dev" lineno="3547"> <summary> Get the attributes of the sound devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_sound_dev" lineno="3565"> <summary> Set the attributes of the sound devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_sound" lineno="3583"> <summary> Read the sound devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_sound" lineno="3601"> <summary> Write the sound devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_sound_mixer" lineno="3619"> <summary> Read the sound mixer devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_sound_mixer" lineno="3637"> <summary> Write the sound mixer devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_power_mgmt_dev" lineno="3655"> <summary> Get the attributes of the the power management device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_power_mgmt_dev" lineno="3673"> <summary> Set the attributes of the the power management device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_power_management" lineno="3691"> <summary> Read and write the the power management device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_smartcard_dev" lineno="3709"> <summary> Getattr on smartcard devices </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_smartcard_dev" lineno="3728"> <summary> dontaudit getattr on smartcard devices </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_smartcard" lineno="3747"> <summary> Read and write smartcard devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_manage_smartcard" lineno="3765"> <summary> Create, read, write, and delete smartcard devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_associate_sysfs" lineno="3783"> <summary> Associate a file to a sysfs filesystem. </summary> <param name="file_type"> <summary> The type of the file to be associated to sysfs. </summary> </param> </interface> <interface name="dev_getattr_sysfs_dirs" lineno="3801"> <summary> Get the attributes of sysfs directories. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="dev_mounton_sysfs" lineno="3819"> <summary> Mount a filesystem on /sys </summary> <param name="domain"> <summary> Domain allow access. </summary> </param> </interface> <interface name="dev_mount_sysfs_fs" lineno="3837"> <summary> Mount sysfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_unmount_sysfs_fs" lineno="3855"> <summary> Unmount sysfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_search_sysfs" lineno="3873"> <summary> Search the sysfs directories. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="dev_dontaudit_search_sysfs" lineno="3891"> <summary> Do not audit attempts to search sysfs. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="dev_list_sysfs" lineno="3909"> <summary> List the contents of the sysfs directories. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="dev_write_sysfs_dirs" lineno="3929"> <summary> Write in a sysfs directories. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="dev_read_sysfs" lineno="3956"> <summary> Read hardware state information. </summary> <desc> <p> Allow the specified domain to read the contents of the sysfs filesystem. This filesystem contains information, parameters, and other settings on the hardware installed on the system. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="dev_rw_sysfs" lineno="3977"> <summary> Allow caller to modify hardware state information. </summary> <param name="domain"> <summary> The process type modifying hardware state information. </summary> </param> </interface> <interface name="dev_read_urand" lineno="4021"> <summary> Read from pseudo random number generator devices (e.g., /dev/urandom). </summary> <desc> <p> Allow the specified domain to read from pseudo random number generator devices (e.g., /dev/urandom). Typically this is used in situations when a cryptographically secure random number is not necessarily needed. One example is the Stack Smashing Protector (SSP, formerly known as ProPolice) support that may be compiled into programs. </p> <p> Related interface: </p> <ul> <li>dev_read_rand()</li> </ul> <p> Related tunable: </p> <ul> <li>global_ssp</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="dev_dontaudit_read_urand" lineno="4040"> <summary> Do not audit attempts to read from pseudo random devices (e.g., /dev/urandom) </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_write_urand" lineno="4059"> <summary> Write to the pseudo random device (e.g., /dev/urandom). This sets the random number generator seed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_write_urand" lineno="4078"> <summary> Do not audit attempts to write to pseudo random devices (e.g., /dev/urandom) </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_getattr_generic_usb_dev" lineno="4096"> <summary> Getattr generic the USB devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_generic_usb_dev" lineno="4115"> <summary> Setattr generic the USB devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_generic_usb_dev" lineno="4134"> <summary> Read generic the USB devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_generic_usb_dev" lineno="4152"> <summary> Read and write generic the USB devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_relabel_generic_usb_dev" lineno="4170"> <summary> Allow relabeling (to and from) of generic usb device </summary> <param name="domain"> <summary> Domain allowed to relabel. </summary> </param> </interface> <interface name="dev_read_usbmon_dev" lineno="4188"> <summary> Read USB monitor devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_usbmon_dev" lineno="4206"> <summary> Write USB monitor devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_mount_usbfs" lineno="4224"> <summary> Mount a usbfs filesystem. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="dev_associate_usbfs" lineno="4242"> <summary> Associate a file to a usbfs filesystem. </summary> <param name="file_type"> <summary> The type of the file to be associated to usbfs. </summary> </param> </interface> <interface name="dev_getattr_usbfs_dirs" lineno="4260"> <summary> Get the attributes of a directory in the usb filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="4279"> <summary> Do not audit attempts to get the attributes of a directory in the usb filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_search_usbfs" lineno="4297"> <summary> Search the directory containing USB hardware information. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="dev_list_usbfs" lineno="4315"> <summary> Allow caller to get a list of usb hardware. </summary> <param name="domain"> <summary> The process type getting the list. </summary> </param> </interface> <interface name="dev_setattr_usbfs_files" lineno="4336"> <summary> Set the attributes of usbfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_usbfs" lineno="4356"> <summary> Read USB hardware information using the usbfs filesystem interface. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="dev_rw_usbfs" lineno="4376"> <summary> Allow caller to modify usb hardware configuration files. </summary> <param name="domain"> <summary> The process type modifying the options. </summary> </param> </interface> <interface name="dev_rw_vhost" lineno="4396"> <summary> Allow read/write the vhost net device </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_video_dev" lineno="4414"> <summary> Get the attributes of video4linux devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_userio_dev" lineno="4432"> <summary> Read and write userio device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_getattr_video_dev" lineno="4451"> <summary> Do not audit attempts to get the attributes of video4linux device nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_setattr_video_dev" lineno="4469"> <summary> Set the attributes of video4linux device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_dontaudit_setattr_video_dev" lineno="4488"> <summary> Do not audit attempts to set the attributes of video4linux device nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="dev_read_video_dev" lineno="4506"> <summary> Read the video4linux devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_video_dev" lineno="4524"> <summary> Write the video4linux devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_vmware" lineno="4542"> <summary> Read and write VMWare devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rwx_vmware" lineno="4560"> <summary> Read, write, and mmap VMWare devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_read_watchdog" lineno="4579"> <summary> Read to watchdog devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_write_watchdog" lineno="4597"> <summary> Write to watchdog devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_wireless" lineno="4615"> <summary> Read and write the the wireless device. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_xen" lineno="4633"> <summary> Read and write Xen devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_manage_xen" lineno="4651"> <summary> Create, read, write, and delete Xen devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_filetrans_xen" lineno="4670"> <summary> Automatic type transition to the type for xen device nodes when created in /dev. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_getattr_xserver_misc_dev" lineno="4688"> <summary> Get the attributes of X server miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_setattr_xserver_misc_dev" lineno="4706"> <summary> Set the attributes of X server miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_xserver_misc" lineno="4724"> <summary> Read and write X server miscellaneous devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rw_zero" lineno="4742"> <summary> Read and write to the zero device (/dev/zero). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_rwx_zero" lineno="4760"> <summary> Read, write, and execute the zero device (/dev/zero). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_execmod_zero" lineno="4779"> <summary> Execmod the zero device (/dev/zero). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_create_zero_dev" lineno="4798"> <summary> Create the zero device (/dev/zero). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="dev_unconfined" lineno="4816"> <summary> Unconfined access to devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="domain" filename="policy/modules/kernel/domain.if"> <summary>Core policy for domains.</summary> <required val="true"> Contains the concept of a domain. </required> <interface name="domain_base_type" lineno="26"> <summary> Make the specified type usable as a basic domain. </summary> <desc> <p> Make the specified type usable as a basic domain. </p> <p> This is primarily used for kernel threads; generally the domain_type() interface is more appropriate for userland processes. </p> </desc> <param name="type"> <summary> Type to be used as a basic domain type. </summary> </param> </interface> <interface name="domain_type" lineno="75"> <summary> Make the specified type usable as a domain. </summary> <desc> <p> Make the specified type usable as a domain. This, or an interface that calls this interface, must be used on all types that are used as domains. </p> <p> Related interfaces: </p> <ul> <li>application_domain()</li> <li>init_daemon_domain()</li> <li>init_domaion()</li> <li>init_ranged_daemon_domain()</li> <li>init_ranged_domain()</li> <li>init_ranged_system_domain()</li> <li>init_script_domain()</li> <li>init_system_domain()</li> </ul> <p> Example: </p> <p> type mydomain_t; domain_type(mydomain_t) type myfile_t; files_type(myfile_t) allow mydomain_t myfile_t:file read_file_perms; </p> </desc> <param name="type"> <summary> Type to be used as a domain type. </summary> </param> <infoflow type="none"/> </interface> <interface name="domain_entry_file" lineno="125"> <summary> Make the specified type usable as an entry point for the domain. </summary> <param name="domain"> <summary> Domain to be entered. </summary> </param> <param name="type"> <summary> Type of program used for entering the domain. </summary> </param> </interface> <interface name="domain_interactive_fd" lineno="149"> <summary> Make the file descriptors of the specified domain for interactive use (widely inheritable) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dyntrans_type" lineno="178"> <summary> Allow the specified domain to perform dynamic transitions. </summary> <desc> <p> Allow the specified domain to perform dynamic transitions. </p> <p> This violates process tranquility, and it is strongly suggested that this not be used. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_system_change_exemption" lineno="198"> <summary> Makes caller and execption to the constraint preventing changing to the system user identity and system role. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_subj_id_change_exemption" lineno="217"> <summary> Makes caller an exception to the constraint preventing changing of user identity. </summary> <param name="domain"> <summary> The process type to make an exception to the constraint. </summary> </param> </interface> <interface name="domain_role_change_exemption" lineno="236"> <summary> Makes caller an exception to the constraint preventing changing of role. </summary> <param name="domain"> <summary> The process type to make an exception to the constraint. </summary> </param> </interface> <interface name="domain_obj_id_change_exemption" lineno="256"> <summary> Makes caller an exception to the constraint preventing changing the user identity in object contexts. </summary> <param name="domain"> <summary> The process type to make an exception to the constraint. </summary> </param> <rolecap/> </interface> <interface name="domain_user_exemption_target" lineno="291"> <summary> Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints. </summary> <desc> <p> Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints. </p> <p> This interface is needed to decouple the user domains from the base module. It should not be used other than on user domains. </p> </desc> <param name="domain"> <summary> Domain target for user exemption. </summary> </param> </interface> <interface name="domain_cron_exemption_source" lineno="326"> <summary> Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints. </summary> <desc> <p> Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints. </p> <p> This interface is needed to decouple the cron domains from the base module. It should not be used other than on cron domains. </p> </desc> <param name="domain"> <summary> Domain target for user exemption. </summary> </param> </interface> <interface name="domain_cron_exemption_target" lineno="361"> <summary> Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints. </summary> <desc> <p> Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints. </p> <p> This interface is needed to decouple the cron domains from the base module. It should not be used other than on user cron jobs. </p> </desc> <param name="domain"> <summary> Domain target for user exemption. </summary> </param> </interface> <interface name="domain_use_interactive_fds" lineno="389"> <summary> Inherit and use file descriptors from domains with interactive programs. </summary> <desc> <p> Allow the specified domain to inherit and use file descriptors from domains with interactive programs. This does not allow access to the objects being referenced by the file descriptors. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="1"/> </interface> <interface name="domain_dontaudit_use_interactive_fds" lineno="409"> <summary> Do not audit attempts to inherit file descriptors from domains with interactive programs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_sigchld_interactive_fds" lineno="429"> <summary> Send a SIGCHLD signal to domains whose file discriptors are widely inheritable. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_setpriority_all_domains" lineno="448"> <summary> Set the nice level of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_signal_all_domains" lineno="467"> <summary> Send general signals to all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_signull_all_domains" lineno="486"> <summary> Send a null signal to all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_dontaudit_signull_all_domains" lineno="505"> <summary> Send a null signal to all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_sigstop_all_domains" lineno="525"> <summary> Send a stop signal to all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_sigchld_all_domains" lineno="544"> <summary> Send a child terminated signal to all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_kill_all_domains" lineno="563"> <summary> Send a kill signal to all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_search_all_domains_state" lineno="582"> <summary> Search the process state directory (/proc/pid) of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_search_all_domains_state" lineno="602"> <summary> Do not audit attempts to search the process state directory (/proc/pid) of all domains. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="domain_read_all_domains_state" lineno="621"> <summary> Read the process state (/proc/pid) of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_getattr_all_domains" lineno="643"> <summary> Get the attributes of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_dontaudit_getattr_all_domains" lineno="661"> <summary> Dontaudit geting the attributes of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_read_confined_domains_state" lineno="680"> <summary> Read the process state (/proc/pid) of all confined domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_getattr_confined_domains" lineno="706"> <summary> Get the attributes of all confined domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_ptrace_all_domains" lineno="725"> <summary> Ptrace all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_dontaudit_ptrace_all_domains" lineno="754"> <summary> Do not audit attempts to ptrace all domains. </summary> <desc> <p> Do not audit attempts to ptrace all domains. </p> <p> Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6). </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_ptrace_confined_domains" lineno="782"> <summary> Do not audit attempts to ptrace confined domains. </summary> <desc> <p> Do not audit attempts to ptrace confined domains. </p> <p> Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6). </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_read_all_domains_state" lineno="801"> <summary> Do not audit attempts to read the process state (/proc/pid) of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_list_all_domains_state" lineno="826"> <summary> Do not audit attempts to read the process state directories of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_getsession_all_domains" lineno="844"> <summary> Get the session ID of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getsession_all_domains" lineno="863"> <summary> Do not audit attempts to get the session ID of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_getpgid_all_domains" lineno="881"> <summary> Get the process group ID of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_getsched_all_domains" lineno="899"> <summary> Get the scheduler information of all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_getattr_all_sockets" lineno="928"> <summary> Get the attributes of all domains sockets, for all socket types. </summary> <desc> <p> Get the attributes of all domains sockets, for all socket types. </p> <p> This is commonly used for domains that can use lsof on all domains. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_sockets" lineno="957"> <summary> Do not audit attempts to get the attributes of all domains sockets, for all socket types. </summary> <desc> <p> Do not audit attempts to get the attributes of all domains sockets, for all socket types. </p> <p> This interface was added for PCMCIA cardmgr and is probably excessive. </p> </desc> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_tcp_sockets" lineno="976"> <summary> Do not audit attempts to get the attributes of all domains TCP sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_udp_sockets" lineno="995"> <summary> Do not audit attempts to get the attributes of all domains UDP sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_rw_all_udp_sockets" lineno="1014"> <summary> Do not audit attempts to read or write all domains UDP sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_key_sockets" lineno="1033"> <summary> Do not audit attempts to get attribues of all domains IPSEC key management sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_packet_sockets" lineno="1052"> <summary> Do not audit attempts to get attribues of all domains packet sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_raw_sockets" lineno="1071"> <summary> Do not audit attempts to get attribues of all domains raw sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_rw_all_key_sockets" lineno="1090"> <summary> Do not audit attempts to read or write all domains key sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_rw_pipes" lineno="1109"> <summary> Do not audit attempts to read or write all domains key sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_dgram_sockets" lineno="1128"> <summary> Do not audit attempts to get the attributes of all domains unix datagram sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_getattr_all_stream_sockets" lineno="1147"> <summary> Get the attributes of all domains unix datagram sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_stream_sockets" lineno="1166"> <summary> Do not audit attempts to get the attributes of all domains unix datagram sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_netlink_sockets" lineno="1185"> <summary> Do not audit attempts to get the attributes of all domains unix datagram sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_netlink_kobject_uevent_sockets" lineno="1204"> <summary> Do not audit attempts to get the attributes of all domains unix datagram sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_getattr_all_pipes" lineno="1233"> <summary> Get the attributes of all domains unnamed pipes. </summary> <desc> <p> Get the attributes of all domains unnamed pipes. </p> <p> This is commonly used for domains that can use lsof on all domains. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_getattr_all_pipes" lineno="1252"> <summary> Do not audit attempts to get the attributes of all domains unnamed pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_ipsec_setcontext_all_domains" lineno="1271"> <summary> Allow specified type to set context of all domains IPSEC associations. </summary> <param name="type"> <summary> Type of subject to be allowed this. </summary> </param> </interface> <interface name="domain_getattr_all_entry_files" lineno="1290"> <summary> Get the attributes of entry point files for all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_read_all_entry_files" lineno="1309"> <summary> Read the entry point files for all domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_exec_all_entry_files" lineno="1330"> <summary> Execute the entry point files for all domains in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="domain_dontaudit_exec_all_entry_files" lineno="1348"> <summary> dontaudit checking for execute on all entry point files </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="domain_manage_all_entry_files" lineno="1368"> <summary> Create, read, write, and delete all entrypoint files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_relabel_all_entry_files" lineno="1388"> <summary> Relabel to and from all entry point file types. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_mmap_all_entry_files" lineno="1407"> <summary> Mmap all entry point files as executable. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_entry_file_spec_domtrans" lineno="1431"> <summary> Execute an entry_type in the specified domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the new process. </summary> </param> </interface> <interface name="domain_mmap_low_type" lineno="1452"> <summary> Ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel. </summary> <param name="domain"> <summary> Domain allowed to mmap low memory. </summary> </param> </interface> <interface name="domain_mmap_low" lineno="1473"> <summary> Ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel. </summary> <param name="domain"> <summary> Domain allowed to mmap low memory. </summary> </param> </interface> <interface name="domain_all_recvfrom_all_domains" lineno="1490"> <summary> Allow specified type to receive labeled networking packets from all domains, over all protocols (TCP, UDP, etc) </summary> <param name="type"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_unconfined_signal" lineno="1508"> <summary> Send generic signals to the unconfined domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_unconfined" lineno="1526"> <summary> Unconfined access to domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="domain_dontaudit_leaks" lineno="1559"> <summary> Do not audit attempts to read or write all leaked sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <tunable name="allow_domain_fd_use" dftval="true"> <desc> <p> Allow all domains to use other domains file descriptors </p> </desc> </tunable> <tunable name="domain_kernel_load_modules" dftval="false"> <desc> <p> Allow all domains to have the kernel load modules </p> </desc> </tunable> <tunable name="fips_mode" dftval="true"> <desc> <p> Allow all domains to execute in fips_mode </p> </desc> </tunable> </module> <module name="files" filename="policy/modules/kernel/files.if"> <summary> Basic filesystem types and interfaces. </summary> <desc> <p> This module contains basic filesystem types and interfaces. This includes: <ul> <li>The concept of different file types including basic files, mount points, tmp files, etc.</li> <li>Access to groups of files and all files.</li> <li>Types and interfaces for the basic filesystem layout (/, /etc, /tmp, /usr, etc.).</li> </ul> </p> </desc> <required val="true"> Contains the concept of a file. Comains the file initial SID. </required> <interface name="files_type" lineno="79"> <summary> Make the specified type usable for files in a filesystem. </summary> <desc> <p> Make the specified type usable for files in a filesystem. Types used for files that do not use this interface, or an interface that calls this one, will have unexpected behaviors while the system is running. If the type is used for device nodes (character or block files), then the dev_node() interface is more appropriate. </p> <p> Related interfaces: </p> <ul> <li>application_domain()</li> <li>application_executable_file()</li> <li>corecmd_executable_file()</li> <li>init_daemon_domain()</li> <li>init_domaion()</li> <li>init_ranged_daemon_domain()</li> <li>init_ranged_domain()</li> <li>init_ranged_system_domain()</li> <li>init_script_file()</li> <li>init_script_domain()</li> <li>init_system_domain()</li> <li>files_config_files()</li> <li>files_lock_file()</li> <li>files_mountpoint()</li> <li>files_pid_file()</li> <li>files_security_file()</li> <li>files_security_mountpoint()</li> <li>files_tmp_file()</li> <li>files_tmpfs_file()</li> <li>logging_log_file()</li> <li>userdom_user_home_content()</li> </ul> <p> Example: </p> <p> type myfile_t; files_type(myfile_t) allow mydomain_t myfile_t:file read_file_perms; </p> </desc> <param name="type"> <summary> Type to be used for files. </summary> </param> <infoflow type="none"/> </interface> <interface name="files_security_file" lineno="100"> <summary> Make the specified type a file that should not be dontaudited from browsing from user domains. </summary> <param name="file_type"> <summary> Type of the file to be used as a member directory. </summary> </param> </interface> <interface name="files_lock_file" lineno="119"> <summary> Make the specified type usable for lock files. </summary> <param name="type"> <summary> Type to be used for lock files. </summary> </param> </interface> <interface name="files_var_lib_file" lineno="139"> <summary> Make the specified type usable for lock files. </summary> <param name="type"> <summary> Type to be used for lock files. </summary> </param> </interface> <interface name="files_mountpoint" lineno="159"> <summary> Make the specified type usable for filesystem mount points. </summary> <param name="type"> <summary> Type to be used for mount points. </summary> </param> </interface> <interface name="files_security_mountpoint" lineno="179"> <summary> Make the specified type usable for security file filesystem mount points. </summary> <param name="type"> <summary> Type to be used for mount points. </summary> </param> </interface> <interface name="files_pid_file" lineno="227"> <summary> Make the specified type usable for runtime process ID files. </summary> <desc> <p> Make the specified type usable for runtime process ID files, typically found in /var/run. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a PID file type may result in problems with starting or stopping services. </p> <p> Related interfaces: </p> <ul> <li>files_pid_filetrans()</li> </ul> <p> Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory: </p> <p> type mypidfile_t; files_pid_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_pid_filetrans(mydomain_t, mypidfile_t, file) </p> </desc> <param name="type"> <summary> Type to be used for PID files. </summary> </param> <infoflow type="none"/> </interface> <interface name="files_config_file" lineno="267"> <summary> Make the specified type a configuration file. </summary> <desc> <p> Make the specified type usable for configuration files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with configuration management tools. </p> <p> Example usage with a domain that can read its configuration file /etc: </p> <p> type myconffile_t; files_config_file(myconffile_t) allow mydomain_t myconffile_t:file read_file_perms; files_search_etc(mydomain_t) </p> </desc> <param name="file_type"> <summary> Type to be used as a configuration file. </summary> </param> <infoflow type="none"/> </interface> <interface name="files_poly" lineno="287"> <summary> Make the specified type a polyinstantiated directory. </summary> <param name="file_type"> <summary> Type of the file to be used as a polyinstantiated directory. </summary> </param> </interface> <interface name="files_poly_parent" lineno="308"> <summary> Make the specified type a parent of a polyinstantiated directory. </summary> <param name="file_type"> <summary> Type of the file to be used as a parent directory. </summary> </param> </interface> <interface name="files_poly_member" lineno="329"> <summary> Make the specified type a polyinstantiation member directory. </summary> <param name="file_type"> <summary> Type of the file to be used as a member directory. </summary> </param> </interface> <interface name="files_poly_member_tmp" lineno="356"> <summary> Make the domain use the specified type of polyinstantiated directory. </summary> <param name="domain"> <summary> Domain using the polyinstantiated directory. </summary> </param> <param name="file_type"> <summary> Type of the file to be used as a member directory. </summary> </param> </interface> <interface name="files_tmp_file" lineno="403"> <summary> Make the specified type a file used for temporary files. </summary> <desc> <p> Make the specified type usable for temporary files. This will also make the type usable for files, making calls to files_type() redundant. Failure to use this interface for a temporary file may result in problems with purging temporary files. </p> <p> Related interfaces: </p> <ul> <li>files_tmp_filetrans()</li> </ul> <p> Example usage with a domain that can create and write its temporary file in the system temporary file directories (/tmp or /var/tmp): </p> <p> type mytmpfile_t; files_tmp_file(mytmpfile_t) allow mydomain_t mytmpfile_t:file { create_file_perms write_file_perms }; files_tmp_filetrans(mydomain_t, mytmpfile_t, file) </p> </desc> <param name="file_type"> <summary> Type of the file to be used as a temporary file. </summary> </param> <infoflow type="none"/> </interface> <interface name="files_tmpfs_file" lineno="425"> <summary> Transform the type into a file, for use on a virtual memory filesystem (tmpfs). </summary> <param name="type"> <summary> The type to be transformed. </summary> </param> </interface> <interface name="files_getattr_all_dirs" lineno="444"> <summary> Get the attributes of all directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_all_dirs" lineno="463"> <summary> Do not audit attempts to get the attributes of all directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_list_non_security" lineno="481"> <summary> List all non-security directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_list_non_security" lineno="500"> <summary> Do not audit attempts to list all non-security directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_mounton_non_security" lineno="519"> <summary> Mount a filesystem on all non-security directories and files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_write_non_security_dirs" lineno="538"> <summary> Allow attempts to modify any directory </summary> <param name="domain"> <summary> Domain to allow </summary> </param> </interface> <interface name="files_manage_non_security_dirs" lineno="556"> <summary> Allow attempts to manage non-security directories </summary> <param name="domain"> <summary> Domain to allow </summary> </param> </interface> <interface name="files_manage_non_security_files" lineno="574"> <summary> Manage all non-security files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabel_non_security_files" lineno="594"> <summary> Relabel all non-security files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_getattr_all_files" lineno="624"> <summary> Get the attributes of all files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_all_files" lineno="644"> <summary> Do not audit attempts to get the attributes of all files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_getattr_non_security_files" lineno="663"> <summary> Do not audit attempts to get the attributes of non security files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_setattr_non_security_files" lineno="682"> <summary> Do not audit attempts to set the attributes of non security files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_setattr_non_security_dirs" lineno="701"> <summary> Do not audit attempts to set the attributes of non security directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_read_all_files" lineno="719"> <summary> Read all files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_execmod_all_files" lineno="750"> <summary> Allow shared library text relocations in all files. </summary> <desc> <p> Allow shared library text relocations in all files. </p> <p> This is added to support WINE policy. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_non_security_files" lineno="769"> <summary> Read all non-security files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_read_all_dirs_except" lineno="796"> <summary> Read all directories on the filesystem, except the listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> </interface> <interface name="files_read_all_files_except" lineno="821"> <summary> Read all files on the filesystem, except the listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> </interface> <interface name="files_read_all_symlinks_except" lineno="846"> <summary> Read all symbolic links on the filesystem, except the listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> </interface> <interface name="files_getattr_all_symlinks" lineno="864"> <summary> Get the attributes of all symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_all_symlinks" lineno="883"> <summary> Do not audit attempts to get the attributes of all symbolic links. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_read_all_symlinks" lineno="901"> <summary> Do not audit attempts to read all symbolic links. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_getattr_non_security_symlinks" lineno="920"> <summary> Do not audit attempts to get the attributes of non security symbolic links. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_getattr_non_security_blk_files" lineno="939"> <summary> Do not audit attempts to get the attributes of non security block devices. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_getattr_non_security_chr_files" lineno="958"> <summary> Do not audit attempts to get the attributes of non security character devices. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_read_all_symlinks" lineno="977"> <summary> Read all symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_getattr_all_pipes" lineno="996"> <summary> Get the attributes of all named pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_all_pipes" lineno="1016"> <summary> Do not audit attempts to get the attributes of all named pipes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_getattr_non_security_pipes" lineno="1035"> <summary> Do not audit attempts to get the attributes of non security named pipes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_rw_non_security_pipes" lineno="1054"> <summary> Do not audit attempts to get the attributes of non security named pipes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_getattr_all_sockets" lineno="1072"> <summary> Get the attributes of all named sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_all_sockets" lineno="1092"> <summary> Do not audit attempts to get the attributes of all named sockets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_getattr_non_security_sockets" lineno="1111"> <summary> Do not audit attempts to get the attributes of non security named sockets. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_read_all_blk_files" lineno="1129"> <summary> Read all block nodes with file types. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_all_chr_files" lineno="1147"> <summary> Read all character nodes with file types. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabel_all_files" lineno="1173"> <summary> Relabel all files on the filesystem, except the listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> <rolecap/> </interface> <interface name="files_rw_all_files" lineno="1209"> <summary> rw all files on the filesystem, except the listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> <rolecap/> </interface> <interface name="files_manage_all_files" lineno="1235"> <summary> Manage all files on the filesystem, except the listed exceptions. </summary> <param name="domain"> <summary> The type of the domain perfoming this action. </summary> </param> <param name="exception_types" optional="true"> <summary> The types to be excluded. Each type or attribute must be negated by the caller. </summary> </param> <rolecap/> </interface> <interface name="files_search_all" lineno="1262"> <summary> Search the contents of all directories on extended attribute filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_all" lineno="1281"> <summary> List the contents of all directories on extended attribute filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_all_dirs" lineno="1301"> <summary> Do not audit attempts to search the contents of any directories on extended attribute filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_getattr_all_file_type_fs" lineno="1324"> <summary> Get the attributes of all filesystems with the type of a file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabelto_all_file_type_fs" lineno="1342"> <summary> Relabel a filesystem to the type of a file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabel_all_file_type_fs" lineno="1360"> <summary> Relabel a filesystem to the type of a file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_mount_all_file_type_fs" lineno="1378"> <summary> Mount all filesystems with the type of a file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_unmount_all_file_type_fs" lineno="1396"> <summary> Unmount all filesystems with the type of a file. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_config_dirs" lineno="1415"> <summary> Manage all configuration directories on filesystem </summary> <param name="domain"> <summary> The type of domain performing this action </summary> </param> </interface> <interface name="files_relabel_config_dirs" lineno="1434"> <summary> Relabel configuration directories </summary> <param name="domain"> <summary> Type of domain performing this action </summary> </param> </interface> <interface name="files_read_config_files" lineno="1452"> <summary> Read config files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_config_files" lineno="1473"> <summary> Manage all configuration files on filesystem </summary> <param name="domain"> <summary> The type of domain performing this action </summary> </param> </interface> <interface name="files_relabel_config_files" lineno="1492"> <summary> Relabel configuration files </summary> <param name="domain"> <summary> Type of domain performing this action </summary> </param> </interface> <interface name="files_mounton_all_mountpoints" lineno="1510"> <summary> Mount a filesystem on all mount points. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_getattr_all_mountpoints" lineno="1529"> <summary> Get the attributes of all mount points. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_all_mountpoint_symlinks" lineno="1547"> <summary> Read all mountpoint symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_all_mountpoints" lineno="1565"> <summary> List the attributes of all mount points. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_setattr_all_mountpoints" lineno="1583"> <summary> Get the attributes of all mount points. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_list_all_mountpoints" lineno="1601"> <summary> Do not audit listing of all mount points. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_search_all_mountpoints" lineno="1619"> <summary> Search all mount points. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_all_mountpoints" lineno="1637"> <summary> Search all mount points. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_write_all_mountpoints" lineno="1655"> <summary> Write all mount points. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_rw_all_mountpoints" lineno="1673"> <summary> Write all mount points. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_root" lineno="1692"> <summary> List the contents of the root directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_rw_root_dir" lineno="1712"> <summary> Do not audit attempts to write files in the root directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_root_filetrans" lineno="1741"> <summary> Create an object in the root directory, with a private type using a type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private type"> <summary> The type of the object to be created. </summary> </param> <param name="object"> <summary> The object class of the object being created. </summary> </param> </interface> <interface name="files_dontaudit_read_root_files" lineno="1760"> <summary> Do not audit attempts to read files in the root directory. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_rw_root_files" lineno="1779"> <summary> Do not audit attempts to read or write files in the root directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_rw_root_chr_files" lineno="1798"> <summary> Do not audit attempts to read or write character device nodes in the root directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_root_file" lineno="1816"> <summary> Remove file entries from the root directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_root_dir_entry" lineno="1834"> <summary> Remove entries from the root directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_unmount_rootfs" lineno="1852"> <summary> Unmount a rootfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_mounton_rootfs" lineno="1870"> <summary> Mount a filesystem on the root file system </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_getattr_boot_dirs" lineno="1888"> <summary> Get attributes of the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_boot_dirs" lineno="1907"> <summary> Do not audit attempts to get attributes of the /boot directory. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_search_boot" lineno="1925"> <summary> Search the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_boot" lineno="1943"> <summary> Do not audit attempts to search the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_boot" lineno="1961"> <summary> List the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_create_boot_dirs" lineno="1979"> <summary> Create directories in /boot </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_boot_dirs" lineno="1997"> <summary> manage directories in /boot </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_boot_filetrans" lineno="2026"> <summary> Create a private type object in boot with an automatic type transition </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private_type"> <summary> The type of the object to be created. </summary> </param> <param name="object_class"> <summary> The object class of the object being created. </summary> </param> </interface> <interface name="files_read_boot_files" lineno="2045"> <summary> read files in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_dontaudit_rw_boot_files" lineno="2065"> <summary> Create, read, write, and delete files in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_manage_boot_files" lineno="2085"> <summary> Create, read, write, and delete files in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_relabelfrom_boot_files" lineno="2103"> <summary> Relabel from files in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_boot_symlinks" lineno="2122"> <summary> Read symbolic links in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_boot_symlinks" lineno="2141"> <summary> Read and write symbolic links in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_boot_symlinks" lineno="2161"> <summary> Create, read, write, and delete symbolic links in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_kernel_img" lineno="2179"> <summary> Read kernel files in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_create_kernel_img" lineno="2200"> <summary> Install a kernel into the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_delete_kernel" lineno="2220"> <summary> Delete a kernel from /boot. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_getattr_default_dirs" lineno="2238"> <summary> Getattr of directories with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_default_dirs" lineno="2257"> <summary> Do not audit attempts to get the attributes of directories with the default file type. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_search_default" lineno="2275"> <summary> Search the contents of directories with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_default" lineno="2293"> <summary> List contents of directories with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_list_default" lineno="2312"> <summary> Do not audit attempts to list contents of directories with the default file type. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_manage_default_dirs" lineno="2331"> <summary> Create, read, write, and delete directories with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_mounton_default" lineno="2349"> <summary> Mount a filesystem on a directory with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_default_files" lineno="2368"> <summary> Do not audit attempts to get the attributes of files with the default file type. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_read_default_files" lineno="2386"> <summary> Read files with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_read_default_files" lineno="2405"> <summary> Do not audit attempts to read files with the default file type. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_manage_default_files" lineno="2424"> <summary> Create, read, write, and delete files with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_default_symlinks" lineno="2442"> <summary> Read symbolic links with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_default_sockets" lineno="2460"> <summary> Read sockets with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_default_pipes" lineno="2478"> <summary> Read named pipes with the default file type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_search_etc" lineno="2496"> <summary> Search the contents of /etc directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_setattr_etc_dirs" lineno="2514"> <summary> Set the attributes of the /etc directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_etc" lineno="2532"> <summary> List the contents of /etc directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_etc_dirs" lineno="2550"> <summary> Add and remove entries from /etc directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_write_etc_dirs" lineno="2568"> <summary> Do not audit attempts to write to /etc dirs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_etc_dirs" lineno="2587"> <summary> Manage generic directories in /etc </summary> <param name="domain"> <summary> Domain allowed access </summary> </param> </interface> <interface name="files_read_etc_files" lineno="2639"> <summary> Read generic files in /etc. </summary> <desc> <p> Allow the specified domain to read generic files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are: </p> <ul> <li>/etc/fstab</li> <li>/etc/passwd</li> <li>/etc/services</li> <li>/etc/shells</li> </ul> <p> This interface does not include access to /etc/shadow. </p> <p> Generally, it is safe for many domains to have this access. However, since this interface provides access to the /etc/passwd file, caution must be exercised, as user account names can be leaked through this access. </p> <p> Related interfaces: </p> <ul> <li>auth_read_shadow()</li> <li>files_read_etc_runtime_files()</li> <li>seutil_read_config()</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="files_dontaudit_write_etc_files" lineno="2660"> <summary> Do not audit attempts to write generic files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_etc_files" lineno="2679"> <summary> Read and write generic files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_manage_etc_files" lineno="2701"> <summary> Create, read, write, and delete generic files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_delete_etc_files" lineno="2720"> <summary> Delete system configuration files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_etc_lnk_files" lineno="2738"> <summary> Delete system configuration lnk files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_etc_dir_entry" lineno="2757"> <summary> Remove entries from the etc directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_exec_etc_files" lineno="2775"> <summary> Execute generic files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabel_etc_files" lineno="2795"> <summary> Relabel from and to generic files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_etc_symlinks" lineno="2814"> <summary> Read symbolic links in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_etc_symlinks" lineno="2832"> <summary> Create, read, write, and delete symbolic links in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_etc_filetrans" lineno="2861"> <summary> Create objects in /etc with a private type using a type_transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="file_type"> <summary> Private file type. </summary> </param> <param name="class"> <summary> Object classes to be created. </summary> </param> </interface> <interface name="files_create_boot_flag" lineno="2886"> <summary> Create a boot flag. </summary> <desc> <p> Create a boot flag, such as /.autorelabel and /.autofsck. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_read_etc_runtime_files" lineno="2925"> <summary> Read files in /etc that are dynamically created on boot, such as mtab. </summary> <desc> <p> Allow the specified domain to read dynamically created configuration files in /etc. These files are typically general system configuration files that do not have more specific SELinux types. Some examples of these files are: </p> <ul> <li>/etc/motd</li> <li>/etc/mtab</li> <li>/etc/nologin</li> </ul> <p> This interface does not include access to /etc/shadow. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10" /> <rolecap/> </interface> <interface name="files_dontaudit_read_etc_runtime_files" lineno="2947"> <summary> Do not audit attempts to read files in /etc that are dynamically created on boot, such as mtab. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_rw_etc_runtime_files" lineno="2967"> <summary> Read and write files in /etc that are dynamically created on boot, such as mtab. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_manage_etc_runtime_files" lineno="2989"> <summary> Create, read, write, and delete files in /etc that are dynamically created on boot, such as mtab. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_dontaudit_setattr_etc_runtime_files" lineno="3008"> <summary> Do not audit attempts to set the attributes of the etc_runtime files </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_etc_filetrans_etc_runtime" lineno="3032"> <summary> Create, etc runtime objects with an automatic type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="object"> <summary> The class of the object being created. </summary> </param> </interface> <interface name="files_getattr_isid_type_dirs" lineno="3051"> <summary> Getattr of directories on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_isid_type_dirs" lineno="3070"> <summary> Do not audit attempts to search directories on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_isid_type_dirs" lineno="3089"> <summary> List the contents of directories on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_isid_type_dirs" lineno="3108"> <summary> Read and write directories on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_isid_type_dirs" lineno="3127"> <summary> Delete directories on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_isid_type_dirs" lineno="3146"> <summary> Create, read, write, and delete directories on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_mounton_isid_type_dirs" lineno="3165"> <summary> Mount a filesystem on a directory on new filesystems that has not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_isid_type_files" lineno="3184"> <summary> Read files on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_isid_type_files" lineno="3203"> <summary> Delete files on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_isid_type_symlinks" lineno="3222"> <summary> Delete lnk_files on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_isid_type_fifo_files" lineno="3241"> <summary> Delete fifo files on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_isid_type_sock_files" lineno="3260"> <summary> Delete sock files on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_isid_type_blk_files" lineno="3279"> <summary> Delete blk files on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_isid_type_chr_files" lineno="3298"> <summary> Delete chr files on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_write_isid_chr_files" lineno="3317"> <summary> Do not audit attempts to write to chr_files that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_isid_type_files" lineno="3336"> <summary> Create, read, write, and delete files on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_isid_type_symlinks" lineno="3355"> <summary> Create, read, write, and delete symbolic links on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_isid_type_blk_files" lineno="3374"> <summary> Read and write block device nodes on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_isid_type_blk_files" lineno="3393"> <summary> Create, read, write, and delete block device nodes on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_isid_type_chr_files" lineno="3412"> <summary> Create, read, write, and delete character device nodes on new filesystems that have not yet been labeled. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_getattr_home_dir" lineno="3431"> <summary> Get the attributes of the home directories root (/home). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_home_dir" lineno="3452"> <summary> Do not audit attempts to get the attributes of the home directories root (/home). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_search_home" lineno="3471"> <summary> Search home directories root (/home). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_home" lineno="3491"> <summary> Do not audit attempts to search home directories root (/home). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_list_home" lineno="3511"> <summary> Do not audit attempts to list home directories root (/home). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_list_home" lineno="3530"> <summary> Get listing of home directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabelto_home" lineno="3549"> <summary> Relabel to user home root (/home). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_home_filetrans" lineno="3577"> <summary> Create objects in /home. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="home_type"> <summary> The private type. </summary> </param> <param name="object"> <summary> The class of the object being created. </summary> </param> </interface> <interface name="files_getattr_lost_found_dirs" lineno="3595"> <summary> Get the attributes of lost+found directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_lost_found_dirs" lineno="3614"> <summary> Do not audit attempts to get the attributes of lost+found directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_manage_lost_found" lineno="3634"> <summary> Create, read, write, and delete objects in lost+found directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_search_mnt" lineno="3656"> <summary> Search the contents of /mnt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_mnt" lineno="3674"> <summary> Do not audit attempts to search /mnt. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_list_mnt" lineno="3692"> <summary> List the contents of /mnt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_list_mnt" lineno="3710"> <summary> dontaudit List the contents of /mnt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_mounton_mnt" lineno="3728"> <summary> Mount a filesystem on /mnt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_mnt_dirs" lineno="3747"> <summary> Create, read, write, and delete directories in /mnt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_manage_mnt_files" lineno="3765"> <summary> Create, read, write, and delete files in /mnt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_mnt_files" lineno="3783"> <summary> read files in /mnt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_mnt_symlinks" lineno="3801"> <summary> Read symbolic links in /mnt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_mnt_symlinks" lineno="3819"> <summary> Create, read, write, and delete symbolic links in /mnt. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_search_kernel_modules" lineno="3837"> <summary> Search the contents of the kernel module directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_kernel_modules" lineno="3856"> <summary> List the contents of the kernel module directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_getattr_kernel_modules" lineno="3874"> <summary> Get the attributes of kernel module files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_kernel_modules" lineno="3892"> <summary> Read kernel module files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_write_kernel_modules" lineno="3912"> <summary> Write kernel module files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_kernel_modules" lineno="3931"> <summary> Delete kernel module files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_kernel_modules" lineno="3951"> <summary> Create, read, write, and delete kernel module files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_relabel_kernel_modules" lineno="3969"> <summary> Relabel from and to kernel module files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_kernel_modules_filetrans" lineno="3999"> <summary> Create objects in the kernel module directories with a private type via an automatic type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private_type"> <summary> The type of the object to be created. </summary> </param> <param name="object_class"> <summary> The object class of the object being created. </summary> </param> </interface> <interface name="files_list_world_readable" lineno="4018"> <summary> List world-readable directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_read_world_readable_files" lineno="4037"> <summary> Read world-readable files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_read_world_readable_symlinks" lineno="4056"> <summary> Read world-readable symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_read_world_readable_pipes" lineno="4074"> <summary> Read world-readable named pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_world_readable_sockets" lineno="4092"> <summary> Read world-readable sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_system_conf_files" lineno="4111"> <summary> Read manageable system configuration files in /etc </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_manage_system_conf_files" lineno="4131"> <summary> Manage manageable system configuration files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabelto_system_conf_files" lineno="4149"> <summary> Relabel manageable system configuration files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabelfrom_system_conf_files" lineno="4167"> <summary> Relabel manageable system configuration files in /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_etc_filetrans_system_conf" lineno="4186"> <summary> Create files in /etc with the type used for the manageable system config files. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="files_associate_tmp" lineno="4206"> <summary> Allow the specified type to associate to a filesystem with the type of the temporary directory (/tmp). </summary> <param name="file_type"> <summary> Type of the file to associate. </summary> </param> </interface> <interface name="files_getattr_tmp_dirs" lineno="4224"> <summary> Get the attributes of the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_tmp_dirs" lineno="4243"> <summary> Do not audit attempts to get the attributes of the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_search_tmp" lineno="4261"> <summary> Search the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_tmp" lineno="4279"> <summary> Do not audit attempts to search the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_tmp" lineno="4297"> <summary> Read the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_list_tmp" lineno="4315"> <summary> Do not audit listing of the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain not to audit. </summary> </param> </interface> <interface name="files_rw_generic_tmp_dir" lineno="4333"> <summary> Allow read and write to the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain not to audit. </summary> </param> </interface> <interface name="files_delete_tmp_dir_entry" lineno="4351"> <summary> Remove entries from the tmp directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_generic_tmp_files" lineno="4369"> <summary> Read files in the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_write_generic_tmp_files" lineno="4387"> <summary> Read files in the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_setattr_generic_tmp_files" lineno="4404"> <summary> Read files in the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_create_generic_tmp_files" lineno="4421"> <summary> Read files in the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_generic_tmp_files" lineno="4438"> <summary> Read files in the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_generic_tmp_dirs" lineno="4455"> <summary> Manage temporary directories in /tmp. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="files_execmod_tmp" lineno="4481"> <summary> Allow shared library text relocations in tmp files. </summary> <desc> <p> Allow shared library text relocations in tmp files. </p> <p> This is added to support java policy. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_generic_tmp_files" lineno="4499"> <summary> Manage temporary files and directories in /tmp. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="files_read_generic_tmp_symlinks" lineno="4517"> <summary> Read symbolic links in the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_generic_tmp_sockets" lineno="4535"> <summary> Read and write generic named sockets in the tmp directory (/tmp). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabelfrom_tmp_dirs" lineno="4553"> <summary> Relabel a dir from the type used in /tmp. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_setattr_all_tmp_dirs" lineno="4571"> <summary> Set the attributes of all tmp directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_inherited_tmp_files" lineno="4589"> <summary> Allow caller to read inherited tmp files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_append_inherited_tmp_files" lineno="4607"> <summary> Allow caller to append inherited tmp files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_inherited_tmp_file" lineno="4625"> <summary> Allow caller to read and write inherited tmp files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_all_tmp" lineno="4643"> <summary> List all tmp directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_all_tmp_files" lineno="4662"> <summary> Do not audit attempts to get the attributes of all tmp files. </summary> <param name="domain"> <summary> Domain not to audit. </summary> </param> </interface> <interface name="files_getattr_all_tmp_files" lineno="4681"> <summary> Allow attempts to get the attributes of all tmp files. </summary> <param name="domain"> <summary> Domain not to audit. </summary> </param> </interface> <interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="4700"> <summary> Do not audit attempts to get the attributes of all tmp sock_file. </summary> <param name="domain"> <summary> Domain not to audit. </summary> </param> </interface> <interface name="files_read_all_tmp_files" lineno="4718"> <summary> Read all tmp files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_tmp_file_leaks" lineno="4737"> <summary> Do not audit attempts to read or write all leaked tmpfiles files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_tmp_filetrans" lineno="4766"> <summary> Create an object in the tmp directories, with a private type using a type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private type"> <summary> The type of the object to be created. </summary> </param> <param name="object"> <summary> The object class of the object being created. </summary> </param> </interface> <interface name="files_purge_tmp" lineno="4784"> <summary> Delete the contents of /tmp. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_search_usr" lineno="4814"> <summary> Search the content of /etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_list_usr" lineno="4833"> <summary> List the contents of generic directories in /usr. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_usr_dirs" lineno="4851"> <summary> Add and remove entries from /usr directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_rw_usr_dirs" lineno="4869"> <summary> dontaudit Add and remove entries from /usr directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_usr_dirs" lineno="4887"> <summary> Delete generic directories in /usr in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_setattr_usr_dirs" lineno="4905"> <summary> Set the attributes of the /usr directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_usr_files" lineno="4923"> <summary> Delete generic files in /usr in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_getattr_usr_files" lineno="4941"> <summary> Get the attributes of files in /usr. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_usr_files" lineno="4977"> <summary> Read generic files in /usr. </summary> <desc> <p> Allow the specified domain to read generic files in /usr. These files are various program files that do not have more specific SELinux types. Some examples of these files are: </p> <ul> <li>/usr/include/*</li> <li>/usr/share/doc/*</li> <li>/usr/share/info/*</li> </ul> <p> Generally, it is safe for many domains to have this access. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="files_exec_usr_files" lineno="4997"> <summary> Execute generic programs in /usr in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_write_usr_dirs" lineno="5017"> <summary> dontaudit write of /usr dirs </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_write_usr_files" lineno="5035"> <summary> dontaudit write of /usr files </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_usr_files" lineno="5053"> <summary> Create, read, write, and delete files in the /usr directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabelto_usr_files" lineno="5071"> <summary> Relabel a file to the type used in /usr. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_relabelfrom_usr_files" lineno="5089"> <summary> Relabel a file from the type used in /usr. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_usr_symlinks" lineno="5107"> <summary> Read symbolic links in /usr. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_usr_filetrans" lineno="5135"> <summary> Create objects in the /usr directory </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="file_type"> <summary> The type of the object to be created </summary> </param> <param name="object_class"> <summary> The object class. </summary> </param> </interface> <interface name="files_dontaudit_search_src" lineno="5153"> <summary> Do not audit attempts to search /usr/src. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_getattr_usr_src_files" lineno="5171"> <summary> Get the attributes of files in /usr/src. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_usr_src_files" lineno="5192"> <summary> Read files in /usr/src. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_exec_usr_src_files" lineno="5213"> <summary> Execute programs in /usr/src in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_create_kernel_symbol_table" lineno="5233"> <summary> Install a system.map into the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_kernel_symbol_table" lineno="5252"> <summary> Read system.map in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_kernel_symbol_table" lineno="5271"> <summary> Delete a system.map in the /boot directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_search_var" lineno="5290"> <summary> Search the contents of /var. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_write_var_dirs" lineno="5308"> <summary> Do not audit attempts to write to /var. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_write_var_dirs" lineno="5326"> <summary> Allow attempts to write to /var.dirs </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_search_var" lineno="5345"> <summary> Do not audit attempts to search the contents of /var. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_list_var" lineno="5363"> <summary> List the contents of /var. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_list_var" lineno="5381"> <summary> Do not audit listing of the var directory (/var). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_manage_var_dirs" lineno="5400"> <summary> Create, read, write, and delete directories in the /var directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_var_files" lineno="5418"> <summary> Read files in the /var directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_var_files" lineno="5436"> <summary> Read and write files in the /var directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_rw_var_files" lineno="5455"> <summary> Do not audit attempts to read and write files in the /var directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_var_files" lineno="5473"> <summary> Create, read, write, and delete files in the /var directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_var_symlinks" lineno="5491"> <summary> Read symbolic links in the /var directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_var_symlinks" lineno="5510"> <summary> Create, read, write, and delete symbolic links in the /var directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_var_filetrans" lineno="5538"> <summary> Create objects in the /var directory </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="file_type"> <summary> The type of the object to be created </summary> </param> <param name="object_class"> <summary> The object class. </summary> </param> </interface> <interface name="files_getattr_var_lib_dirs" lineno="5556"> <summary> Get the attributes of the /var/lib directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_search_var_lib" lineno="5588"> <summary> Search the /var/lib directory. </summary> <desc> <p> Search the /var/lib directory. This is necessary to access files or directories under /var/lib that have a private type. For example, a domain accessing a private library file in the /var/lib directory: </p> <p> allow mydomain_t mylibfile_t:file read_file_perms; files_search_var_lib(mydomain_t) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="5"/> </interface> <interface name="files_list_var_lib" lineno="5606"> <summary> List the contents of the /var/lib directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_var_lib_dirs" lineno="5624"> <summary> Read-write /var/lib directories </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_relabel_var_lib_files" lineno="5642"> <summary> Read-write /var/lib directories </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_relabel_tmp_files" lineno="5660"> <summary> Read-write /var/lib directories </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_var_lib_filetrans" lineno="5688"> <summary> Create objects in the /var/lib directory </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="file_type"> <summary> The type of the object to be created </summary> </param> <param name="object_class"> <summary> The object class. </summary> </param> </interface> <interface name="files_read_var_lib_files" lineno="5707"> <summary> Read generic files in /var/lib. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_var_lib_symlinks" lineno="5726"> <summary> Read generic symbolic links in /var/lib </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_urandom_seed" lineno="5748"> <summary> Create, read, write, and delete the pseudorandom number generator seed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_mounttab" lineno="5768"> <summary> Allow domain to manage mount tables necessary for rpcd, nfsd, etc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_search_locks" lineno="5787"> <summary> Search the locks directory (/var/lock). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_locks" lineno="5806"> <summary> Do not audit attempts to search the locks directory (/var/lock). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_rw_inherited_locks" lineno="5825"> <summary> Do not audit attempts to read/write inherited locks (/var/lock). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_rw_inherited_all_locks" lineno="5844"> <summary> Do not audit attempts to read/write inherited locks (/var/lock). </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_setattr_lock_dirs" lineno="5862"> <summary> Set the attributes of the /var/lock directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_rw_lock_dirs" lineno="5881"> <summary> Add and remove entries in the /var/lock directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_getattr_generic_locks" lineno="5899"> <summary> Get the attributes of generic lock files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_generic_locks" lineno="5920"> <summary> Create, read, write, and delete generic lock files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_all_locks" lineno="5940"> <summary> Delete all lock files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_read_all_locks" lineno="5960"> <summary> Read all lock files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_all_locks" lineno="5982"> <summary> manage all lock files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_lock_filetrans" lineno="6015"> <summary> Create an object in the locks directory, with a private type using a type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private type"> <summary> The type of the object to be created. </summary> </param> <param name="object"> <summary> The object class of the object being created. </summary> </param> </interface> <interface name="files_dontaudit_getattr_pid_dirs" lineno="6035"> <summary> Do not audit attempts to get the attributes of the /var/run directory. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_search_pids" lineno="6054"> <summary> Search the contents of runtime process ID directories (/var/run). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_all_pids" lineno="6073"> <summary> Do not audit attempts to search the all /var/run directory. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_rw_pid_dirs" lineno="6091"> <summary> Add and remove entries from pid directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_create_var_run_dirs" lineno="6109"> <summary> Create generic pid directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_pids" lineno="6129"> <summary> Do not audit attempts to search the /var/run directory. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_list_pids" lineno="6148"> <summary> List the contents of the runtime process ID directories (/var/run). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_generic_pids" lineno="6166"> <summary> Read generic process ID files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_write_generic_pid_pipes" lineno="6185"> <summary> Write named generic process ID pipes </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_pid_filetrans" lineno="6240"> <summary> Create an object in the process ID directory, with a private type. </summary> <desc> <p> Create an object in the process ID directory (e.g., /var/run) with a private type. Typically this is used for creating private PID files in /var/run with the private type instead of the general PID file type. To accomplish this goal, either the program must be SELinux-aware, or use this interface. </p> <p> Related interfaces: </p> <ul> <li>files_pid_file()</li> </ul> <p> Example usage with a domain that can create and write its PID file with a private PID file type in the /var/run directory: </p> <p> type mypidfile_t; files_pid_file(mypidfile_t) allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms }; files_pid_filetrans(mydomain_t, mypidfile_t, file) </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private type"> <summary> The type of the object to be created. </summary> </param> <param name="object"> <summary> The object class of the object being created. </summary> </param> <infoflow type="write" weight="10"/> </interface> <interface name="files_rw_generic_pids" lineno="6259"> <summary> Read and write generic process ID files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_all_pids" lineno="6279"> <summary> Do not audit attempts to get the attributes of daemon runtime data files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_write_all_pids" lineno="6297"> <summary> Do not audit attempts to write to daemon runtime data files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_ioctl_all_pids" lineno="6315"> <summary> Do not audit attempts to ioctl daemon runtime data files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_all_pids" lineno="6334"> <summary> Read all process ID files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_mounton_all_poly_members" lineno="6356"> <summary> Mount filesystems on all polyinstantiation member directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_delete_all_pids" lineno="6375"> <summary> Delete all process IDs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_delete_all_pid_dirs" lineno="6399"> <summary> Delete all process ID directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_setattr_pid_dirs" lineno="6419"> <summary> Set the attributes of the /var/run directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_search_spool" lineno="6438"> <summary> Search the contents of generic spool directories (/var/spool). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_search_spool" lineno="6457"> <summary> Do not audit attempts to search generic spool directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_list_spool" lineno="6476"> <summary> List the contents of generic spool (/var/spool) directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_generic_spool_dirs" lineno="6495"> <summary> Create, read, write, and delete generic spool directories (/var/spool). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_read_generic_spool" lineno="6514"> <summary> Read generic spool files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_generic_spool" lineno="6534"> <summary> Create, read, write, and delete generic spool files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_spool_filetrans" lineno="6565"> <summary> Create objects in the spool directory with a private type with a type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="file"> <summary> Type to which the created node will be transitioned. </summary> </param> <param name="class"> <summary> Object class(es) (single or set including {}) for which this the transition will occur. </summary> </param> </interface> <interface name="files_polyinstantiate_all" lineno="6585"> <summary> Allow access to manage all polyinstantiated directories on the system. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_unconfined" lineno="6639"> <summary> Unconfined access to files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_manage_root_files" lineno="6663"> <summary> Create a core files in / </summary> <desc> <p> Create a core file in /, </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_create_default_dir" lineno="6687"> <summary> Create a default directory </summary> <desc> <p> Create a default_t direcrory </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_root_filetrans_default" lineno="6711"> <summary> Create, default_t objects with an automatic type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="object"> <summary> The class of the object being created. </summary> </param> </interface> <interface name="files_manage_generic_pids_symlinks" lineno="6730"> <summary> manage generic symbolic links in the /var/run directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_dontaudit_getattr_tmpfs_files" lineno="6749"> <summary> Do not audit attempts to getattr all tmpfs files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_read_security_files" lineno="6767"> <summary> Do not audit attempts to read security files </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_rw_all_inherited_files" lineno="6790"> <summary> rw any files inherited from another process </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="object_type"> <summary> Object type. </summary> </param> </interface> <interface name="files_entrypoint_all_files" lineno="6812"> <summary> Allow any file point to be the entrypoint of this domain </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="files_dontaudit_all_non_security_leaks" lineno="6830"> <summary> Do not audit attempts to rw inherited file perms of non security files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="files_dontaudit_leaks" lineno="6849"> <summary> Do not audit attempts to read or write all leaked files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="files_create_as_is_all_files" lineno="6868"> <summary> Allow domain to create_file_ass all types </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="filesystem" filename="policy/modules/kernel/filesystem.if"> <summary>Policy for filesystems.</summary> <required val="true"> Contains the initial SID for the filesystems. </required> <interface name="fs_type" lineno="16"> <summary> Transform specified type into a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_noxattr_type" lineno="36"> <summary> Transform specified type into a filesystem type which does not have extended attribute support. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_associate" lineno="59"> <summary> Associate the specified file type to persistent filesystems with extended attributes. This allows a file of this type to be created on a filesystem such as ext3, JFS, and XFS. </summary> <param name="file_type"> <summary> The type of the to be associated. </summary> </param> </interface> <interface name="fs_associate_noxattr" lineno="81"> <summary> Associate the specified file type to filesystems which lack extended attributes support. This allows a file of this type to be created on a filesystem such as FAT32, and NFS. </summary> <param name="file_type"> <summary> The type of the to be associated. </summary> </param> </interface> <interface name="fs_exec_noxattr" lineno="101"> <summary> Execute files on a filesystem that does not support extended attributes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_mount_xattr_fs" lineno="121"> <summary> Mount a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_xattr_fs" lineno="142"> <summary> Remount a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_xattr_fs" lineno="162"> <summary> Unmount a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_xattr_fs" lineno="198"> <summary> Get the attributes of persistent filesystems which have extended attributes, such as ext3, JFS, or XFS. </summary> <desc> <p> Allow the specified domain to get the attributes of a persistent filesystems which have extended attributes, such as ext3, JFS, or XFS. Example attributes: </p> <ul> <li>Type of the file system (e.g., ext3)</li> <li>Size of the file system</li> <li>Available space on the file system</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="5"/> <rolecap/> </interface> <interface name="fs_dontaudit_getattr_xattr_fs" lineno="219"> <summary> Do not audit attempts to get the attributes of a persistent filesystem which has extended attributes, such as ext3, JFS, or XFS. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_relabelfrom_xattr_fs" lineno="239"> <summary> Allow changing of the label of a filesystem with extended attributes using the context= mount option. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_get_xattr_fs_quotas" lineno="259"> <summary> Get the filesystem quotas of a filesystem with extended attributes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_set_xattr_fs_quotas" lineno="279"> <summary> Set the filesystem quotas of a filesystem with extended attributes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_read_anon_inodefs_files" lineno="297"> <summary> Read files on anon_inodefs file systems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_anon_inodefs_files" lineno="317"> <summary> Read and write files on anon_inodefs file systems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_rw_anon_inodefs_files" lineno="337"> <summary> Do not audit attempts to read or write files on anon_inodefs file systems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mount_autofs" lineno="356"> <summary> Mount an automount pseudo filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_autofs" lineno="375"> <summary> Remount an automount pseudo filesystem This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_autofs" lineno="393"> <summary> Unmount an automount pseudo filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_autofs" lineno="412"> <summary> Get the attributes of an automount pseudo filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_auto_mountpoints" lineno="439"> <summary> Search automount filesystem to use automatically mounted filesystems. </summary> <desc> Allow the specified domain to search mount points that have filesystems that are mounted by the automount service. Generally this will be required for any domain that accesses objects on these filesystems. </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="5"/> </interface> <interface name="fs_list_auto_mountpoints" lineno="460"> <summary> Read directories of automatically mounted filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_list_auto_mountpoints" lineno="479"> <summary> Do not audit attempts to list directories of automatically mounted filesystems. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_manage_autofs_symlinks" lineno="498"> <summary> Create, read, write, and delete symbolic links on an autofs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_binfmt_misc_dirs" lineno="517"> <summary> Get the attributes of directories on binfmt_misc filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_register_binary_executable_type" lineno="553"> <summary> Register an interpreter for new binary file types, using the kernel binfmt_misc support. </summary> <desc> <p> Register an interpreter for new binary file types, using the kernel binfmt_misc support. </p> <p> A common use for this is to register a JVM as an interpreter for Java byte code. Registered binaries can be directly executed on a command line without specifying the interpreter. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_delete_cgroup_dirs" lineno="571"> <summary> Delete directories on cgroup. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mount_cgroup" lineno="589"> <summary> Mount a cgroup filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_cgroup" lineno="608"> <summary> Remount a cgroup filesystem This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_cgroup" lineno="626"> <summary> Unmount a cgroup file system. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_cgroup" lineno="644"> <summary> Get the attributes of a cgroup filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_cgroup_files" lineno="662"> <summary> Get attributes of cgroup files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_cgroup_dirs" lineno="683"> <summary> Search cgroup directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_cgroup_dirs" lineno="705"> <summary> list dirs on cgroup file systems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_cgroup_dirs" lineno="723"> <summary> Manage dirs on cgroup file systems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_setattr_cgroup_files" lineno="743"> <summary> Set attributes of files on cgroup file systems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_cgroup_files" lineno="763"> <summary> Read files on cgroup file systems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_write_cgroup_files" lineno="783"> <summary> Write files on cgroup file systems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_cgroup_files" lineno="802"> <summary> Read and write files on cgroup file systems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_rw_cgroup_files" lineno="823"> <summary> Do not audit attempts to getattr, open, read and write files on cgroup file systems. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_manage_cgroup_files" lineno="841"> <summary> Manage cgroup files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mounton_cgroup" lineno="860"> <summary> Mount on cgroup directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_list_cifs_dirs" lineno="879"> <summary> Do not audit attempts to read dirs on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_mount_cifs" lineno="897"> <summary> Mount a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_cifs" lineno="916"> <summary> Remount a CIFS or SMB network filesystem. This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_cifs" lineno="934"> <summary> Unmount a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_cifs" lineno="954"> <summary> Get the attributes of a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_search_cifs" lineno="972"> <summary> Search directories on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_cifs" lineno="991"> <summary> List the contents of directories on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_list_cifs" lineno="1010"> <summary> Do not audit attempts to list the contents of directories on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_mounton_cifs" lineno="1028"> <summary> Mounton a CIFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_cifs_files" lineno="1047"> <summary> Read files on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_read_cifs_dirs" lineno="1067"> <summary> Read files on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_getattr_noxattr_fs" lineno="1088"> <summary> Get the attributes of filesystems that do not have extended attribute support. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_list_noxattr_fs" lineno="1106"> <summary> Read all noxattrfs directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_noxattr_fs_dirs" lineno="1124"> <summary> Create, read, write, and delete all noxattrfs directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_noxattr_fs_files" lineno="1142"> <summary> Read all noxattrfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1160"> <summary> Dont audit attempts to write to noxattrfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_inherited_noxattr_fs_files" lineno="1178"> <summary> Read/Write all inherited noxattrfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_create_noxattr_fs_files" lineno="1196"> <summary> Create noxattrfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_noxattr_fs_files" lineno="1215"> <summary> Create, read, write, and delete all noxattrfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_noxattr_fs_symlinks" lineno="1233"> <summary> Read all noxattrfs symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_read_cifs_files" lineno="1252"> <summary> Do not audit attempts to read files on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_append_cifs_files" lineno="1271"> <summary> Append files on a CIFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_append_cifs_files" lineno="1290"> <summary> dontaudit Append files on a CIFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_inherited_cifs_files" lineno="1308"> <summary> Read inherited files on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_rw_inherited_cifs_files" lineno="1326"> <summary> Read/Write inherited files on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_rw_cifs_files" lineno="1345"> <summary> Do not audit attempts to read or write files on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_read_cifs_symlinks" lineno="1363"> <summary> Read symbolic links on a CIFS or SMB filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_cifs_named_pipes" lineno="1383"> <summary> Read named pipes on a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_cifs_named_sockets" lineno="1402"> <summary> Read named pipes on a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_exec_cifs_files" lineno="1423"> <summary> Execute files on a CIFS or SMB network filesystem, in the caller domain. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_manage_cifs_dirs" lineno="1444"> <summary> Create, read, write, and delete directories on a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_manage_cifs_dirs" lineno="1464"> <summary> Do not audit attempts to create, read, write, and delete directories on a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_cifs_files" lineno="1484"> <summary> Create, read, write, and delete files on a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_manage_cifs_files" lineno="1504"> <summary> Do not audit attempts to create, read, write, and delete files on a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_manage_cifs_symlinks" lineno="1523"> <summary> Create, read, write, and delete symbolic links on a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_cifs_named_pipes" lineno="1542"> <summary> Create, read, write, and delete named pipes on a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_cifs_named_sockets" lineno="1561"> <summary> Create, read, write, and delete named sockets on a CIFS or SMB network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_cifs_domtrans" lineno="1604"> <summary> Execute a file on a CIFS or SMB filesystem in the specified domain. </summary> <desc> <p> Execute a file on a CIFS or SMB filesystem in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> <p> This interface was added to handle home directories on CIFS/SMB filesystems, in particular used by the ssh-agent policy. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the new process. </summary> </param> </interface> <interface name="fs_cifs_entry_type" lineno="1624"> <summary> Make general progams in cifs an entrypoint for the specified domain. </summary> <param name="domain"> <summary> The domain for which cifs_t is an entrypoint. </summary> </param> </interface> <interface name="fs_search_configfs_dirs" lineno="1643"> <summary> Create, read, write, and delete dirs on a configfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_configfs_dirs" lineno="1663"> <summary> Create, read, write, and delete dirs on a configfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_configfs_files" lineno="1682"> <summary> Create, read, write, and delete files on a configfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mount_dos_fs" lineno="1701"> <summary> Mount a DOS filesystem, such as FAT32 or NTFS. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_dos_fs" lineno="1721"> <summary> Remount a DOS filesystem, such as FAT32 or NTFS. This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_dos_fs" lineno="1740"> <summary> Unmount a DOS filesystem, such as FAT32 or NTFS. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_dos_fs" lineno="1760"> <summary> Get the attributes of a DOS filesystem, such as FAT32 or NTFS. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_relabelfrom_dos_fs" lineno="1779"> <summary> Allow changing of the label of a DOS filesystem using the context= mount option. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_dos" lineno="1797"> <summary> Search dosfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_dos" lineno="1815"> <summary> List dirs DOS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_dos_dirs" lineno="1834"> <summary> Create, read, write, and delete dirs on a DOS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_dos_files" lineno="1852"> <summary> Read files on a DOS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_dos_files" lineno="1871"> <summary> Create, read, write, and delete files on a DOS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_eventpollfs" lineno="1898"> <summary> Read eventpollfs files. </summary> <desc> <p> Read eventpollfs files </p> <p> This interface has been deprecated, and will be removed in the future. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mount_fusefs" lineno="1912"> <summary> Mount a FUSE filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_fusefs" lineno="1930"> <summary> Unmount a FUSE filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mounton_fusefs" lineno="1948"> <summary> Mounton a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_fusefs_domtrans" lineno="1991"> <summary> Execute a file on a FUSE filesystem in the specified domain. </summary> <desc> <p> Execute a file on a FUSE filesystem in the specified domain. This allows the specified domain to execute any file on these filesystems in the specified domain. This is not suggested. </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> <p> This interface was added to handle home directories on FUSE filesystems, in particular used by the ssh-agent policy. </p> </desc> <param name="domain"> <summary> Domain allowed to transition. </summary> </param> <param name="target_domain"> <summary> The type of the new process. </summary> </param> </interface> <interface name="fs_getattr_fusefs" lineno="2011"> <summary> Get the attributes of a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_search_fusefs" lineno="2031"> <summary> Search directories on a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_list_fusefs" lineno="2050"> <summary> Do not audit attempts to list the contents of directories on a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_manage_fusefs_dirs" lineno="2070"> <summary> Create, read, write, and delete directories on a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2090"> <summary> Do not audit attempts to create, read, write, and delete directories on a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_read_fusefs_files" lineno="2109"> <summary> Read, a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_manage_fusefs_files" lineno="2129"> <summary> Create, read, write, and delete files on a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_exec_fusefs_files" lineno="2147"> <summary> Execute files on a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_manage_fusefs_files" lineno="2168"> <summary> Do not audit attempts to create, read, write, and delete files on a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_read_fusefs_symlinks" lineno="2186"> <summary> Read symbolic links on a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_fusefs_symlinks" lineno="2205"> <summary> Manage symbolic links on a FUSEFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_hugetlbfs" lineno="2224"> <summary> Get the attributes of an hugetlbfs filesystem; </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_hugetlbfs_files" lineno="2242"> <summary> Read hugetlbfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_hugetlbfs_files" lineno="2260"> <summary> Read and write hugetlbfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_hugetlbfs_dirs" lineno="2278"> <summary> Manage hugetlbfs dirs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_hugetlbfs" lineno="2296"> <summary> List hugetlbfs dirs </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_associate_hugetlbfs" lineno="2314"> <summary> Allow the type to associate to hugetlbfs filesystems. </summary> <param name="type"> <summary> The type of the object to be associated. </summary> </param> </interface> <interface name="fs_search_inotifyfs" lineno="2332"> <summary> Search inotifyfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_inotifyfs" lineno="2350"> <summary> List inotifyfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_list_inotifyfs" lineno="2369"> <summary> Dontaudit List inotifyfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_hugetlbfs_filetrans" lineno="2398"> <summary> Create an object in a hugetlbfs filesystem, with a private type using a type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private type"> <summary> The type of the object to be created. </summary> </param> <param name="object"> <summary> The object class of the object being created. </summary> </param> </interface> <interface name="fs_mount_iso9660_fs" lineno="2418"> <summary> Mount an iso9660 filesystem, which is usually used on CDs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_iso9660_fs" lineno="2438"> <summary> Remount an iso9660 filesystem, which is usually used on CDs. This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_iso9660_fs" lineno="2457"> <summary> Unmount an iso9660 filesystem, which is usually used on CDs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_iso9660_fs" lineno="2477"> <summary> Get the attributes of an iso9660 filesystem, which is usually used on CDs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_getattr_iso9660_files" lineno="2496"> <summary> Read files on an iso9660 filesystem, which is usually used on CDs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_iso9660_files" lineno="2516"> <summary> Read files on an iso9660 filesystem, which is usually used on CDs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mount_nfs" lineno="2536"> <summary> Mount a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_nfs" lineno="2555"> <summary> Remount a NFS filesystem. This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_nfs" lineno="2573"> <summary> Unmount a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_nfs" lineno="2592"> <summary> Get the attributes of a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_search_nfs" lineno="2610"> <summary> Search directories on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_nfs" lineno="2628"> <summary> List NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_list_nfs" lineno="2647"> <summary> Do not audit attempts to list the contents of directories on a NFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_mounton_nfs" lineno="2665"> <summary> Mounton a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_nfs_files" lineno="2684"> <summary> Read files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_read_nfs_files" lineno="2705"> <summary> Do not audit attempts to read files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_write_nfs_files" lineno="2723"> <summary> Read files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_exec_nfs_files" lineno="2743"> <summary> Execute files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_nfs_entry_type" lineno="2763"> <summary> Make general progams in nfs an entrypoint for the specified domain. </summary> <param name="domain"> <summary> The domain for which nfs_t is an entrypoint. </summary> </param> </interface> <interface name="fs_append_nfs_files" lineno="2783"> <summary> Append files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_append_nfs_files" lineno="2803"> <summary> dontaudit Append files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_read_inherited_nfs_files" lineno="2821"> <summary> Read inherited files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_rw_inherited_nfs_files" lineno="2839"> <summary> Read/write inherited files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_rw_nfs_files" lineno="2858"> <summary> Do not audit attempts to read or write files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_read_nfs_symlinks" lineno="2876"> <summary> Read symbolic links on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_read_nfs_symlinks" lineno="2895"> <summary> Dontaudit read symbolic links on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_nfs_named_sockets" lineno="2913"> <summary> Read named sockets on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_nfs_named_pipes" lineno="2932"> <summary> Read named pipes on a NFS network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_getattr_rpc_dirs" lineno="2950"> <summary> Read directories of RPC file system pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_rpc" lineno="2969"> <summary> Search directories of RPC file system pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_removable" lineno="2987"> <summary> Search removable storage directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_list_removable" lineno="3005"> <summary> Do not audit attempts to list removable storage directories. </summary> <param name="domain"> <summary> Domain not to audit. </summary> </param> </interface> <interface name="fs_read_removable_files" lineno="3023"> <summary> Read removable storage files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_read_removable_files" lineno="3041"> <summary> Do not audit attempts to read removable storage files. </summary> <param name="domain"> <summary> Domain not to audit. </summary> </param> </interface> <interface name="fs_dontaudit_write_removable_files" lineno="3059"> <summary> Do not audit attempts to write removable storage files. </summary> <param name="domain"> <summary> Domain not to audit. </summary> </param> </interface> <interface name="fs_read_removable_symlinks" lineno="3077"> <summary> Read removable storage symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_removable_blk_files" lineno="3095"> <summary> Read and write block nodes on removable filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_rpc" lineno="3114"> <summary> Read directories of RPC file system pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_rpc_files" lineno="3132"> <summary> Read files of RPC file system pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_rpc_symlinks" lineno="3150"> <summary> Read symbolic links of RPC file system pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_rpc_sockets" lineno="3168"> <summary> Read sockets of RPC file system pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_rpc_sockets" lineno="3186"> <summary> Read and write sockets of RPC file system pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_nfs_dirs" lineno="3206"> <summary> Create, read, write, and delete directories on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_manage_nfs_dirs" lineno="3227"> <summary> Create, read, write, and delete directories on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_manage_nfs_dirs" lineno="3248"> <summary> Do not audit attempts to create, read, write, and delete directories on a NFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_manage_nfs_files" lineno="3268"> <summary> Create, read, write, and delete files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_manage_nfs_files" lineno="3289"> <summary> Do not audit attempts to create, read, write, and delete files on a NFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_manage_nfs_symlinks" lineno="3309"> <summary> Create, read, write, and delete symbolic links on a NFS network filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_manage_nfs_named_pipes" lineno="3328"> <summary> Create, read, write, and delete named pipes on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_nfs_named_sockets" lineno="3347"> <summary> Create, read, write, and delete named sockets on a NFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_nfs_domtrans" lineno="3390"> <summary> Execute a file on a NFS filesystem in the specified domain. </summary> <desc> <p> Execute a file on a NFS filesystem in the specified domain. This allows the specified domain to execute any file on a NFS filesystem in the specified domain. This is not suggested. </p> <p> No interprocess communication (signals, pipes, etc.) is provided by this interface since the domains are not owned by this module. </p> <p> This interface was added to handle home directories on NFS filesystems, in particular used by the ssh-agent policy. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="target_domain"> <summary> The type of the new process. </summary> </param> </interface> <interface name="fs_mount_nfsd_fs" lineno="3409"> <summary> Mount a NFS server pseudo filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_nfsd_fs" lineno="3428"> <summary> Mount a NFS server pseudo filesystem. This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_nfsd_fs" lineno="3446"> <summary> Unmount a NFS server pseudo filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_nfsd_fs" lineno="3465"> <summary> Get the attributes of a NFS server pseudo filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_nfsd_fs" lineno="3483"> <summary> Search NFS server directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_nfsd_fs" lineno="3501"> <summary> List NFS server directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_nfsd_files" lineno="3519"> <summary> Getattr files on an nfsd filesystem </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_nfsd_files" lineno="3537"> <summary> read files on an nfsd filesystem </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_nfsd_fs" lineno="3555"> <summary> Read and write NFS server files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_associate_ramfs" lineno="3573"> <summary> Allow the type to associate to ramfs filesystems. </summary> <param name="type"> <summary> The type of the object to be associated. </summary> </param> </interface> <interface name="fs_mount_ramfs" lineno="3591"> <summary> Mount a RAM filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_ramfs" lineno="3610"> <summary> Remount a RAM filesystem. This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_ramfs" lineno="3628"> <summary> Unmount a RAM filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_ramfs" lineno="3646"> <summary> Get the attributes of a RAM filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_ramfs" lineno="3664"> <summary> Search directories on a ramfs </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_search_ramfs" lineno="3682"> <summary> Dontaudit Search directories on a ramfs </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_ramfs_dirs" lineno="3701"> <summary> Create, read, write, and delete directories on a ramfs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_read_ramfs_files" lineno="3719"> <summary> Dontaudit read on a ramfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_read_ramfs_pipes" lineno="3737"> <summary> Dontaudit read on a ramfs fifo_files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_ramfs_files" lineno="3756"> <summary> Create, read, write, and delete files on a ramfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_write_ramfs_pipes" lineno="3774"> <summary> Write to named pipe on a ramfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_write_ramfs_pipes" lineno="3793"> <summary> Do not audit attempts to write to named pipes on a ramfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_ramfs_pipes" lineno="3811"> <summary> Read and write a named pipe on a ramfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_ramfs_pipes" lineno="3830"> <summary> Create, read, write, and delete named pipes on a ramfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_write_ramfs_sockets" lineno="3848"> <summary> Write to named socket on a ramfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_ramfs_sockets" lineno="3867"> <summary> Create, read, write, and delete named sockets on a ramfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mount_romfs" lineno="3885"> <summary> Mount a ROM filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_romfs" lineno="3904"> <summary> Remount a ROM filesystem. This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_romfs" lineno="3922"> <summary> Unmount a ROM filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_romfs" lineno="3941"> <summary> Get the attributes of a ROM filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mount_rpc_pipefs" lineno="3959"> <summary> Mount a RPC pipe filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_rpc_pipefs" lineno="3978"> <summary> Remount a RPC pipe filesystem. This allows some mount option to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_rpc_pipefs" lineno="3996"> <summary> Unmount a RPC pipe filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_rpc_pipefs" lineno="4015"> <summary> Get the attributes of a RPC pipe filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_rpc_named_pipes" lineno="4033"> <summary> Read and write RPC pipe filesystem named pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mount_tmpfs" lineno="4051"> <summary> Mount a tmpfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_tmpfs" lineno="4069"> <summary> Remount a tmpfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_tmpfs" lineno="4087"> <summary> Unmount a tmpfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_tmpfs" lineno="4107"> <summary> Get the attributes of a tmpfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_associate_tmpfs" lineno="4125"> <summary> Allow the type to associate to tmpfs filesystems. </summary> <param name="type"> <summary> The type of the object to be associated. </summary> </param> </interface> <interface name="fs_getattr_tmpfs_dirs" lineno="4143"> <summary> Get the attributes of tmpfs directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="4162"> <summary> Do not audit attempts to get the attributes of tmpfs directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_setattr_tmpfs_dirs" lineno="4180"> <summary> Set the attributes of tmpfs directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_tmpfs" lineno="4198"> <summary> Search tmpfs directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_tmpfs" lineno="4216"> <summary> List the contents of generic tmpfs directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_list_tmpfs" lineno="4235"> <summary> Do not audit attempts to list the contents of generic tmpfs directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_manage_tmpfs_dirs" lineno="4254"> <summary> Create, read, write, and delete tmpfs directories </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_tmpfs_filetrans" lineno="4283"> <summary> Create an object in a tmpfs filesystem, with a private type using a type transition. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <param name="private type"> <summary> The type of the object to be created. </summary> </param> <param name="object"> <summary> The object class of the object being created. </summary> </param> </interface> <interface name="fs_dontaudit_getattr_tmpfs_files" lineno="4303"> <summary> Do not audit attempts to getattr generic tmpfs files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_dontaudit_rw_tmpfs_files" lineno="4322"> <summary> Do not audit attempts to read or write generic tmpfs files. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_rw_inherited_tmpfs_files" lineno="4340"> <summary> Read and write generic tmpfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_auto_mountpoints" lineno="4359"> <summary> Create, read, write, and delete auto moutpoints. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_tmpfs_files" lineno="4377"> <summary> Read generic tmpfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_tmpfs_files" lineno="4395"> <summary> Read and write generic tmpfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_delete_tmpfs_files" lineno="4413"> <summary> Delete generic tmpfs files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_read_tmpfs_symlinks" lineno="4431"> <summary> Read tmpfs link files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_tmpfs_chr_files" lineno="4449"> <summary> Read and write character nodes on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="4468"> <summary> dontaudit Read and write character nodes on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_read_tmpfs_blk_dev" lineno="4487"> <summary> dontaudit Read and write block nodes on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_relabel_tmpfs_chr_file" lineno="4505"> <summary> Relabel character nodes on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_rw_tmpfs_blk_files" lineno="4524"> <summary> Read and write block nodes on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_relabel_tmpfs_blk_file" lineno="4543"> <summary> Relabel block nodes on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_tmpfs_files" lineno="4563"> <summary> Read and write, create and delete generic files on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_tmpfs_symlinks" lineno="4582"> <summary> Read and write, create and delete symbolic links on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_tmpfs_sockets" lineno="4601"> <summary> Read and write, create and delete socket files on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_tmpfs_chr_files" lineno="4620"> <summary> Read and write, create and delete character nodes on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_tmpfs_blk_files" lineno="4639"> <summary> Read and write, create and delete block nodes on tmpfs filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_mount_xenfs" lineno="4657"> <summary> Mount a XENFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_xenfs" lineno="4675"> <summary> Search the XENFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_manage_xenfs_dirs" lineno="4695"> <summary> Create, read, write, and delete directories on a XENFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_manage_xenfs_dirs" lineno="4715"> <summary> Do not audit attempts to create, read, write, and delete directories on a XENFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_manage_xenfs_files" lineno="4735"> <summary> Create, read, write, and delete files on a XENFS filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="fs_dontaudit_manage_xenfs_files" lineno="4755"> <summary> Do not audit attempts to create, read, write, and delete files on a XENFS filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_mount_all_fs" lineno="4773"> <summary> Mount all filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_remount_all_fs" lineno="4792"> <summary> Remount all filesystems. This allows some mount options to be changed. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unmount_all_fs" lineno="4810"> <summary> Unmount all filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_all_fs" lineno="4842"> <summary> Get the attributes of all filesystems. </summary> <desc> <p> Allow the specified domain to et the attributes of all filesystems. Example attributes: </p> <ul> <li>Type of the file system (e.g., ext3)</li> <li>Size of the file system</li> <li>Available space on the file system</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="5"/> <rolecap/> </interface> <interface name="fs_dontaudit_getattr_all_fs" lineno="4862"> <summary> Do not audit attempts to get the attributes all filesystems. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="fs_get_all_fs_quotas" lineno="4881"> <summary> Get the quotas of all filesystems. </summary> <param name="domain"> <summary> The type of the domain getting quotas. </summary> </param> <rolecap/> </interface> <interface name="fs_set_all_quotas" lineno="4900"> <summary> Set the quotas of all filesystems. </summary> <param name="domain"> <summary> The type of the domain setting quotas. </summary> </param> <rolecap/> </interface> <interface name="fs_relabelfrom_all_fs" lineno="4918"> <summary> Relabelfrom all filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_all_dirs" lineno="4937"> <summary> Get the attributes of all directories with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_search_all" lineno="4955"> <summary> Search all directories with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_list_all" lineno="4973"> <summary> List all directories with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_all_files" lineno="4992"> <summary> Get the attributes of all files with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_all_symlinks" lineno="5011"> <summary> Get the attributes of all symbolic links with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_all_pipes" lineno="5030"> <summary> Get the attributes of all named pipes with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_all_sockets" lineno="5049"> <summary> Get the attributes of all named sockets with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_all_blk_files" lineno="5068"> <summary> Get the attributes of all blk files with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_getattr_all_chr_files" lineno="5087"> <summary> Get the attributes of all chr files with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_getattr_all_files" lineno="5106"> <summary> Do not audit attempts to get the attributes of all files with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_getattr_all_symlinks" lineno="5125"> <summary> Do not audit attempts to get the attributes of all symbolic links with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_getattr_all_pipes" lineno="5144"> <summary> Do not audit attempts to get the attributes of all named pipes with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_getattr_all_sockets" lineno="5163"> <summary> Do not audit attempts to get the attributes of all named sockets with a filesystem type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_unconfined" lineno="5181"> <summary> Unconfined access to filesystems </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_relabelfrom_noxattr_fs" lineno="5200"> <summary> Relabel all objets from filesystems that do not support extended attributes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="fs_dontaudit_leaks" lineno="5226"> <summary> Do not audit attempts to read or write all leaked filesystems files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="kernel" filename="policy/modules/kernel/kernel.if"> <summary> Policy for kernel threads, proc filesystem, and unlabeled processes and objects. </summary> <required val="true"> This module has initial SIDs. </required> <interface name="kernel_domtrans_to" lineno="25"> <summary> Allows to start userland processes by transitioning to the specified domain. </summary> <param name="domain"> <summary> The process type entered by kernel. </summary> </param> <param name="entrypoint"> <summary> The executable type for the entrypoint. </summary> </param> </interface> <interface name="kernel_ranged_domtrans_to" lineno="55"> <summary> Allows to start userland processes by transitioning to the specified domain, with a range transition. </summary> <param name="domain"> <summary> The process type entered by kernel. </summary> </param> <param name="entrypoint"> <summary> The executable type for the entrypoint. </summary> </param> <param name="range"> <summary> Range for the domain. </summary> </param> </interface> <interface name="kernel_rootfs_mountpoint" lineno="83"> <summary> Allows the kernel to mount filesystems on the specified directory type. </summary> <param name="directory_type"> <summary> The type of the directory to use as a mountpoint. </summary> </param> </interface> <interface name="kernel_setpgid" lineno="101"> <summary> Set the process group of kernel threads. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_setsched" lineno="119"> <summary> Set the priority of kernel threads. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_sigchld" lineno="137"> <summary> Send a SIGCHLD signal to kernel threads. </summary> <param name="domain"> <summary> The type of the process sending the signal. </summary> </param> </interface> <interface name="kernel_kill" lineno="155"> <summary> Send a kill signal to kernel threads. </summary> <param name="domain"> <summary> The type of the process sending the signal. </summary> </param> </interface> <interface name="kernel_signal" lineno="173"> <summary> Send a generic signal to kernel threads. </summary> <param name="domain"> <summary> The type of the process sending the signal. </summary> </param> </interface> <interface name="kernel_share_state" lineno="192"> <summary> Allows the kernel to share state information with the caller. </summary> <param name="domain"> <summary> The type of the process with which to share state information. </summary> </param> </interface> <interface name="kernel_use_fds" lineno="210"> <summary> Permits caller to use kernel file descriptors. </summary> <param name="domain"> <summary> The type of the process using the descriptors. </summary> </param> </interface> <interface name="kernel_dontaudit_use_fds" lineno="229"> <summary> Do not audit attempts to use kernel file descriptors. </summary> <param name="domain"> <summary> The type of process not to audit. </summary> </param> </interface> <interface name="kernel_rw_pipes" lineno="247"> <summary> Read and write kernel unnamed pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_rw_unix_dgram_sockets" lineno="265"> <summary> Read and write kernel unix datagram sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dgram_send" lineno="283"> <summary> Send messages to kernel unix datagram sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_tcp_recvfrom" lineno="301"> <summary> Receive messages from kernel TCP sockets. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_udp_send" lineno="315"> <summary> Send UDP network traffic to the kernel. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_udp_recvfrom" lineno="329"> <summary> Receive messages from kernel UDP sockets. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_load_module" lineno="343"> <summary> Allows caller to load kernel modules </summary> <param name="domain"> <summary> The process type to allow to load kernel modules. </summary> </param> </interface> <interface name="kernel_search_key" lineno="367"> <summary> Allow search the kernel key ring. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_search_key" lineno="385"> <summary> dontaudit search the kernel key ring. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_link_key" lineno="403"> <summary> Allow link to the kernel key ring. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_link_key" lineno="421"> <summary> dontaudit link to the kernel key ring. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_read_ring_buffer" lineno="440"> <summary> Allows caller to read the ring buffer. </summary> <param name="domain"> <summary> The process type allowed to read the ring buffer. </summary> </param> <rolecap/> </interface> <interface name="kernel_dontaudit_read_ring_buffer" lineno="458"> <summary> Do not audit attempts to read the ring buffer. </summary> <param name="domain"> <summary> The domain to not audit. </summary> </param> </interface> <interface name="kernel_change_ring_buffer_level" lineno="477"> <summary> Change the level of kernel messages logged to the console. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_clear_ring_buffer" lineno="496"> <summary> Allows the caller to clear the ring buffer. </summary> <param name="domain"> <summary> The process type clearing the buffer. </summary> </param> <rolecap/> </interface> <interface name="kernel_request_load_module" lineno="527"> <summary> Allows caller to request the kernel to load a module </summary> <desc> <p> Allow the specified domain to request that the kernel load a kernel module. An example of this is the auto-loading of network drivers when doing an ioctl() on a network interface. </p> <p> In the specific case of a module loading request on a network interface, the domain will also need the net_admin capability. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_request_load_module" lineno="558"> <summary> Dontaudit caller request the kernel to load a module </summary> <desc> <p> Allow the specified domain to request that the kernel load a kernel module. An example of this is the auto-loading of network drivers when doing an ioctl() on a network interface. </p> <p> In the specific case of a module loading request on a network interface, the domain will also need the net_admin capability. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_get_sysvipc_info" lineno="576"> <summary> Get information on all System V IPC objects. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_getattr_debugfs" lineno="594"> <summary> Get the attributes of a kernel debugging filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_mount_debugfs" lineno="612"> <summary> Mount a kernel debugging filesystem. </summary> <param name="domain"> <summary> The type of the domain mounting the filesystem. </summary> </param> </interface> <interface name="kernel_unmount_debugfs" lineno="630"> <summary> Unmount a kernel debugging filesystem. </summary> <param name="domain"> <summary> The type of the domain unmounting the filesystem. </summary> </param> </interface> <interface name="kernel_remount_debugfs" lineno="648"> <summary> Remount a kernel debugging filesystem. </summary> <param name="domain"> <summary> The type of the domain remounting the filesystem. </summary> </param> </interface> <interface name="kernel_search_debugfs" lineno="666"> <summary> Search the contents of a kernel debugging filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_search_debugfs" lineno="684"> <summary> Do not audit attempts to search the kernel debugging filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_read_debugfs" lineno="702"> <summary> Read information from the debugging filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_mount_kvmfs" lineno="722"> <summary> Mount a kernel VM filesystem. </summary> <param name="domain"> <summary> The type of the domain mounting the filesystem. </summary> </param> </interface> <interface name="kernel_unmount_proc" lineno="740"> <summary> Unmount the proc filesystem. </summary> <param name="domain"> <summary> The type of the domain unmounting the filesystem. </summary> </param> </interface> <interface name="kernel_getattr_proc" lineno="758"> <summary> Get the attributes of the proc filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_search_proc" lineno="776"> <summary> Search directories in /proc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_list_proc" lineno="794"> <summary> List the contents of directories in /proc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_list_proc" lineno="813"> <summary> Do not audit attempts to list the contents of directories in /proc. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_getattr_proc_files" lineno="831"> <summary> Get the attributes of files in /proc. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_read_proc_symlinks" lineno="858"> <summary> Read generic symbolic links in /proc. </summary> <desc> <p> Allow the specified domain to read (follow) generic symbolic links (symlinks) in the proc filesystem (/proc). This interface does not include access to the targets of these links. An example symlink is /proc/self. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="kernel_read_system_state" lineno="897"> <summary> Allows caller to read system state information in /proc. </summary> <desc> <p> Allow the specified domain to read general system state information from the proc filesystem (/proc). </p> <p> Generally it should be safe to allow this access. Some example files that can be read based on this interface: </p> <ul> <li>/proc/cpuinfo</li> <li>/proc/meminfo</li> <li>/proc/uptime</li> </ul> <p> This does not allow access to sysctl entries (/proc/sys/*) nor process state information (/proc/pid). </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> <rolecap/> </interface> <interface name="kernel_write_proc_files" lineno="923"> <summary> Write to generic proc entries. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_dontaudit_read_system_state" lineno="942"> <summary> Do not audit attempts by caller to read system state information in proc. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_search_numa_state" lineno="961"> <summary> Allow searching of numa state directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_search_numa_state" lineno="981"> <summary> Do not audit attempts to search the numa state directory. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_read_numa_state" lineno="1000"> <summary> Allow caller to read the numa state information. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_read_numa_state_symlinks" lineno="1022"> <summary> Allow caller to read the numa state symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_write_numa_state" lineno="1043"> <summary> Allow caller to write numa state information. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_read_proc_symlinks" lineno="1062"> <summary> Do not audit attempts by caller to read system state information in proc. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_rw_afs_state" lineno="1081"> <summary> Allow caller to read and write state information for AFS. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_read_software_raid_state" lineno="1101"> <summary> Allow caller to read the state information for software raid. </summary> <param name="domain"> <summary> The process type reading software raid state. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_software_raid_state" lineno="1121"> <summary> Allow caller to read and set the state information for software raid. </summary> <param name="domain"> <summary> The process type reading software raid state. </summary> </param> </interface> <interface name="kernel_getattr_core_if" lineno="1141"> <summary> Allows caller to get attribues of core kernel interface. </summary> <param name="domain"> <summary> The process type getting the attibutes. </summary> </param> </interface> <interface name="kernel_dontaudit_getattr_core_if" lineno="1162"> <summary> Do not audit attempts to get the attributes of core kernel interfaces. </summary> <param name="domain"> <summary> The process type to not audit. </summary> </param> </interface> <interface name="kernel_read_core_if" lineno="1180"> <summary> Allows caller to read the core kernel interface. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_read_messages" lineno="1204"> <summary> Allow caller to read kernel messages using the /proc/kmsg interface. </summary> <param name="domain"> <summary> The process type reading the messages. </summary> </param> </interface> <interface name="kernel_getattr_message_if" lineno="1226"> <summary> Allow caller to get the attributes of kernel message interface (/proc/kmsg). </summary> <param name="domain"> <summary> The process type getting the attributes. </summary> </param> </interface> <interface name="kernel_dontaudit_getattr_message_if" lineno="1245"> <summary> Do not audit attempts by caller to get the attributes of kernel message interfaces. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_dontaudit_search_network_state" lineno="1265"> <summary> Do not audit attempts to search the network state directory. </summary> <param name="domain"> <summary> The process type reading the state. </summary> </param> </interface> <interface name="kernel_search_network_state" lineno="1284"> <summary> Allow searching of network state directory. </summary> <param name="domain"> <summary> The process type reading the state. </summary> </param> </interface> <interface name="kernel_read_network_state" lineno="1315"> <summary> Read the network state information. </summary> <desc> <p> Allow the specified domain to read the networking state information. This includes several pieces of networking information, such as network interface names, netfilter (iptables) statistics, protocol information, routes, and remote procedure call (RPC) information. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> <rolecap/> </interface> <interface name="kernel_read_network_state_symlinks" lineno="1336"> <summary> Allow caller to read the network state symbolic links. </summary> <param name="domain"> <summary> The process type reading the state. </summary> </param> </interface> <interface name="kernel_search_xen_state" lineno="1357"> <summary> Allow searching of xen state directory. </summary> <param name="domain"> <summary> The process type reading the state. </summary> </param> </interface> <interface name="kernel_dontaudit_search_xen_state" lineno="1377"> <summary> Do not audit attempts to search the xen state directory. </summary> <param name="domain"> <summary> The process type reading the state. </summary> </param> </interface> <interface name="kernel_read_xen_state" lineno="1396"> <summary> Allow caller to read the xen state information. </summary> <param name="domain"> <summary> The process type reading the state. </summary> </param> </interface> <interface name="kernel_read_xen_state_symlinks" lineno="1418"> <summary> Allow caller to read the xen state symbolic links. </summary> <param name="domain"> <summary> The process type reading the state. </summary> </param> </interface> <interface name="kernel_write_xen_state" lineno="1439"> <summary> Allow caller to write xen state information. </summary> <param name="domain"> <summary> The process type writing the state. </summary> </param> </interface> <interface name="kernel_list_all_proc" lineno="1457"> <summary> Allow attempts to list all proc directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_dontaudit_list_all_proc" lineno="1476"> <summary> Do not audit attempts to list all proc directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_dontaudit_search_sysctl" lineno="1497"> <summary> Do not audit attempts by caller to search the base directory of sysctls. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_read_sysctl" lineno="1516"> <summary> Allow access to read sysctl directories. </summary> <param name="domain"> <summary> The process type to allow to read sysctl directories. </summary> </param> </interface> <interface name="kernel_read_device_sysctls" lineno="1536"> <summary> Allow caller to read the device sysctls. </summary> <param name="domain"> <summary> The process type to allow to read the device sysctls. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_device_sysctls" lineno="1557"> <summary> Read and write device sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_search_vm_sysctl" lineno="1577"> <summary> Allow caller to search virtual memory sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_read_vm_sysctls" lineno="1596"> <summary> Allow caller to read virtual memory sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_vm_sysctls" lineno="1617"> <summary> Read and write virtual memory sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_search_network_sysctl" lineno="1639"> <summary> Search network sysctl directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_search_network_sysctl" lineno="1657"> <summary> Do not audit attempts by caller to search network sysctl directories. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_read_net_sysctls" lineno="1676"> <summary> Allow caller to read network sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_net_sysctls" lineno="1697"> <summary> Allow caller to modiry contents of sysctl network files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_read_unix_sysctls" lineno="1719"> <summary> Allow caller to read unix domain socket sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_unix_sysctls" lineno="1741"> <summary> Read and write unix domain socket sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_read_hotplug_sysctls" lineno="1762"> <summary> Read the hotplug sysctl. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_hotplug_sysctls" lineno="1783"> <summary> Read and write the hotplug sysctl. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_read_modprobe_sysctls" lineno="1804"> <summary> Read the modprobe sysctl. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_modprobe_sysctls" lineno="1825"> <summary> Read and write the modprobe sysctl. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_dontaudit_search_kernel_sysctl" lineno="1845"> <summary> Do not audit attempts to search generic kernel sysctls. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_read_crypto_sysctls" lineno="1863"> <summary> Read generic crypto sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_read_kernel_sysctls" lineno="1904"> <summary> Read general kernel sysctls. </summary> <desc> <p> Allow the specified domain to read general kernel sysctl settings. These settings are typically read using the sysctl program. The settings that are included by this interface are prefixed with "kernel.", for example, kernel.sysrq. </p> <p> This does not include access to the hotplug handler setting (kernel.hotplug) nor the module installer handler setting (kernel.modprobe). </p> <p> Related interfaces: </p> <ul> <li>kernel_rw_kernel_sysctl()</li> </ul> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> <infoflow type="read" weight="10"/> </interface> <interface name="kernel_dontaudit_write_kernel_sysctl" lineno="1924"> <summary> Do not audit attempts to write generic kernel sysctls. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_rw_kernel_sysctl" lineno="1943"> <summary> Read and write generic kernel sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_read_fs_sysctls" lineno="1964"> <summary> Read filesystem sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_fs_sysctls" lineno="1985"> <summary> Read and write fileystem sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_read_irq_sysctls" lineno="2006"> <summary> Read IRQ sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_irq_sysctls" lineno="2027"> <summary> Read and write IRQ sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_read_rpc_sysctls" lineno="2048"> <summary> Read RPC sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_rpc_sysctls" lineno="2069"> <summary> Read and write RPC sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_dontaudit_list_all_sysctls" lineno="2089"> <summary> Do not audit attempts to list all sysctl directories. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_read_all_sysctls" lineno="2109"> <summary> Allow caller to read all sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_rw_all_sysctls" lineno="2132"> <summary> Read and write all sysctls. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="kernel_kill_unlabeled" lineno="2156"> <summary> Send a kill signal to unlabeled processes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_mount_unlabeled" lineno="2174"> <summary> Mount a kernel unlabeled filesystem. </summary> <param name="domain"> <summary> The type of the domain mounting the filesystem. </summary> </param> </interface> <interface name="kernel_unmount_unlabeled" lineno="2192"> <summary> Unmount a kernel unlabeled filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_signal_unlabeled" lineno="2211"> <summary> Send general signals to unlabeled processes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_signull_unlabeled" lineno="2229"> <summary> Send a null signal to unlabeled processes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_sigstop_unlabeled" lineno="2247"> <summary> Send a stop signal to unlabeled processes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_sigchld_unlabeled" lineno="2265"> <summary> Send a child terminated signal to unlabeled processes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_list_unlabeled" lineno="2283"> <summary> List unlabeled directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_read_unlabeled_state" lineno="2301"> <summary> Read the process state (/proc/pid) of all unlabeled_t. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_list_unlabeled" lineno="2321"> <summary> Do not audit attempts to list unlabeled directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_rw_unlabeled_dirs" lineno="2339"> <summary> Read and write unlabeled directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_rw_unlabeled_files" lineno="2357"> <summary> Read and write unlabeled files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2376"> <summary> Do not audit attempts by caller to get the attributes of an unlabeled file. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_dontaudit_read_unlabeled_files" lineno="2395"> <summary> Do not audit attempts by caller to read an unlabeled file. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2414"> <summary> Do not audit attempts by caller to get the attributes of unlabeled symbolic links. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2433"> <summary> Do not audit attempts by caller to get the attributes of unlabeled named pipes. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2452"> <summary> Do not audit attempts by caller to get the attributes of unlabeled named sockets. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="2471"> <summary> Do not audit attempts by caller to get attributes for unlabeled block devices. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_rw_unlabeled_blk_files" lineno="2489"> <summary> Read and write unlabeled block device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_rw_unlabeled_socket" lineno="2507"> <summary> Read and write unlabeled sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="2526"> <summary> Do not audit attempts by caller to get attributes for unlabeled character devices. </summary> <param name="domain"> <summary> The process type not to audit. </summary> </param> </interface> <interface name="kernel_relabelfrom_unlabeled_dirs" lineno="2544"> <summary> Allow caller to relabel unlabeled directories. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_relabelfrom_unlabeled_fs" lineno="2562"> <summary> Allow caller to relabel unlabeled filesystems. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_relabelfrom_unlabeled_files" lineno="2580"> <summary> Allow caller to relabel unlabeled files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="2599"> <summary> Allow caller to relabel unlabeled symbolic links. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_relabelfrom_unlabeled_pipes" lineno="2618"> <summary> Allow caller to relabel unlabeled named pipes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_relabelfrom_unlabeled_sockets" lineno="2637"> <summary> Allow caller to relabel unlabeled named sockets. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_sendrecv_unlabeled_association" lineno="2671"> <summary> Send and receive messages from an unlabeled IPSEC association. </summary> <desc> <p> Send and receive messages from an unlabeled IPSEC association. Network connections that are not protected by IPSEC have use an unlabeled assocation. </p> <p> The corenetwork interface corenet_non_ipsec_sendrecv() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="2707"> <summary> Do not audit attempts to send and receive messages from an unlabeled IPSEC association. </summary> <desc> <p> Do not audit attempts to send and receive messages from an unlabeled IPSEC association. Network connections that are not protected by IPSEC have use an unlabeled assocation. </p> <p> The corenetwork interface corenet_dontaudit_non_ipsec_sendrecv() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_tcp_recvfrom_unlabeled" lineno="2734"> <summary> Receive TCP packets from an unlabeled connection. </summary> <desc> <p> Receive TCP packets from an unlabeled connection. </p> <p> The corenetwork interface corenet_tcp_recv_unlabeled() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="2763"> <summary> Do not audit attempts to receive TCP packets from an unlabeled connection. </summary> <desc> <p> Do not audit attempts to receive TCP packets from an unlabeled connection. </p> <p> The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_udp_recvfrom_unlabeled" lineno="2790"> <summary> Receive UDP packets from an unlabeled connection. </summary> <desc> <p> Receive UDP packets from an unlabeled connection. </p> <p> The corenetwork interface corenet_udp_recv_unlabeled() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="2819"> <summary> Do not audit attempts to receive UDP packets from an unlabeled connection. </summary> <desc> <p> Do not audit attempts to receive UDP packets from an unlabeled connection. </p> <p> The corenetwork interface corenet_dontaudit_udp_recv_unlabeled() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_raw_recvfrom_unlabeled" lineno="2846"> <summary> Receive Raw IP packets from an unlabeled connection. </summary> <desc> <p> Receive Raw IP packets from an unlabeled connection. </p> <p> The corenetwork interface corenet_raw_recv_unlabeled() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="2875"> <summary> Do not audit attempts to receive Raw IP packets from an unlabeled connection. </summary> <desc> <p> Do not audit attempts to receive Raw IP packets from an unlabeled connection. </p> <p> The corenetwork interface corenet_dontaudit_raw_recv_unlabeled() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_rw_unlabeled_rawip_socket" lineno="2902"> <summary> Read/Write Raw IP packets from an unlabeled connection. </summary> <desc> <p> Receive Raw IP packets from an unlabeled connection. </p> <p> The corenetwork interface corenet_raw_recv_unlabeled() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_sendrecv_unlabeled_packets" lineno="2932"> <summary> Send and receive unlabeled packets. </summary> <desc> <p> Send and receive unlabeled packets. These packets do not match any netfilter SECMARK rules. </p> <p> The corenetwork interface corenet_sendrecv_unlabeled_packets() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_recvfrom_unlabeled_peer" lineno="2960"> <summary> Receive packets from an unlabeled peer. </summary> <desc> <p> Receive packets from an unlabeled peer, these packets do not have any peer labeling information present. </p> <p> The corenetwork interface corenet_recvfrom_unlabeled_peer() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="2988"> <summary> Do not audit attempts to receive packets from an unlabeled peer. </summary> <desc> <p> Do not audit attempts to receive packets from an unlabeled peer, these packets do not have any peer labeling information present. </p> <p> The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled() should be used instead of this one. </p> </desc> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="kernel_relabelfrom_unlabeled_database" lineno="3006"> <summary> Relabel from unlabeled database objects. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_relabelto_unlabeled" lineno="3043"> <summary> Relabel to unlabeled context . </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_unconfined" lineno="3061"> <summary> Unconfined access to kernel module resources. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_rw_stream_socket_perms" lineno="3080"> <summary> Allow the specified domain to read/write on the kernel with a unix socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="kernel_stream_connect" lineno="3100"> <summary> Allow the specified domain to connect to the kernel with a unix socket. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="procs_type" lineno="3118"> <summary> Make the specified type usable for regular entries in proc </summary> <param name="type"> <summary> Type to be used for /proc entries. </summary> </param> </interface> </module> <module name="mcs" filename="policy/modules/kernel/mcs.if"> <summary>Multicategory security policy</summary> <required val="true"> Contains attributes used in MCS policy. </required> <interface name="mcs_file_read_all" lineno="18"> <summary> This domain is allowed to read files and directories regardless of their MCS category set. </summary> <param name="domain"> <summary> Domain target for user exemption. </summary> </param> <rolecap/> </interface> <interface name="mcs_file_write_all" lineno="38"> <summary> This domain is allowed to write files and directories regardless of their MCS category set. </summary> <param name="domain"> <summary> Domain target for user exemption. </summary> </param> <rolecap/> </interface> <interface name="mcs_killall" lineno="58"> <summary> This domain is allowed to sigkill and sigstop all domains regardless of their MCS category set. </summary> <param name="domain"> <summary> Domain target for user exemption. </summary> </param> <rolecap/> </interface> <interface name="mcs_ptrace_all" lineno="78"> <summary> This domain is allowed to ptrace all domains regardless of their MCS category set. </summary> <param name="domain"> <summary> Domain target for user exemption. </summary> </param> </interface> <interface name="mcs_process_set_categories" lineno="98"> <summary> Make specified domain MCS trusted for setting any category set for the processes it executes. </summary> <param name="domain"> <summary> Domain target for user exemption. </summary> </param> </interface> <interface name="mcs_untrusted_proc" lineno="124"> <summary> Make specified process type MCS untrusted. </summary> <desc> <p> Make specified process type MCS untrusted. This prevents this process from sending signals to other processes with different mcs labels object. </p> </desc> <param name="domain"> <summary> The type of the process. </summary> </param> </interface> <interface name="mcs_socket_write_all_levels" lineno="144"> <summary> Make specified domain MCS trusted for writing to sockets at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> </module> <module name="mls" filename="policy/modules/kernel/mls.if"> <summary>Multilevel security policy</summary> <desc> <p> This module contains interfaces for handling multilevel security. The interfaces allow the specified subjects and objects to be allowed certain privileges in the MLS rules. </p> </desc> <required val="true"> Contains attributes used in MLS policy. </required> <interface name="mls_file_read_to_clearance" lineno="26"> <summary> Make specified domain MLS trusted for reading from files up to its clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_file_read_up" lineno="55"> <summary> Make specified domain MLS trusted for reading from files at all levels. (Deprecated) </summary> <desc> <p> Make specified domain MLS trusted for reading from files at all levels. </p> <p> This interface has been deprecated, please use mls_file_read_all_levels() instead. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="mls_file_read_all_levels" lineno="72"> <summary> Make specified domain MLS trusted for reading from files at all levels. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_file_write_to_clearance" lineno="92"> <summary> Make specified domain MLS trusted for write to files up to its clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_file_write_down" lineno="121"> <summary> Make specified domain MLS trusted for writing to files at all levels. (Deprecated) </summary> <desc> <p> Make specified domain MLS trusted for writing to files at all levels. </p> <p> This interface has been deprecated, please use mls_file_write_all_levels() instead. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="mls_file_write_all_levels" lineno="138"> <summary> Make specified domain MLS trusted for writing to files at all levels. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_file_upgrade" lineno="158"> <summary> Make specified domain MLS trusted for raising the level of files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_file_downgrade" lineno="178"> <summary> Make specified domain MLS trusted for lowering the level of files. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_file_write_within_range" lineno="200"> <summary> Make specified domain trusted to be written to within its MLS range. The subject's MLS range must be a proper subset of the object's MLS range. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_socket_read_all_levels" lineno="220"> <summary> Make specified domain MLS trusted for reading from sockets at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_socket_read_to_clearance" lineno="241"> <summary> Make specified domain MLS trusted for reading from sockets at any level that is dominated by the process clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_socket_write_to_clearance" lineno="262"> <summary> Make specified domain MLS trusted for writing to sockets up to its clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_socket_write_all_levels" lineno="282"> <summary> Make specified domain MLS trusted for writing to sockets at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_net_receive_all_levels" lineno="303"> <summary> Make specified domain MLS trusted for receiving network data from network interfaces or hosts at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_net_write_within_range" lineno="325"> <summary> Make specified domain trusted to write to network objects within its MLS range. The subject's MLS range must be a proper subset of the object's MLS range. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_net_inbound_all_levels" lineno="346"> <summary> Make specified domain trusted to write inbound packets regardless of the network's or node's MLS range. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_net_outbound_all_levels" lineno="367"> <summary> Make specified domain trusted to write outbound packets regardless of the network's or node's MLS range. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_sysvipc_read_to_clearance" lineno="388"> <summary> Make specified domain MLS trusted for reading from System V IPC objects up to its clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_sysvipc_read_all_levels" lineno="409"> <summary> Make specified domain MLS trusted for reading from System V IPC objects at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_sysvipc_write_to_clearance" lineno="430"> <summary> Make specified domain MLS trusted for writing to System V IPC objects up to its clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_sysvipc_write_all_levels" lineno="451"> <summary> Make specified domain MLS trusted for writing to System V IPC objects at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_rangetrans_source" lineno="471"> <summary> Allow the specified domain to do a MLS range transition that changes the current level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="mls_rangetrans_target" lineno="491"> <summary> Make specified domain a target domain for MLS range transitions that change the current level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="mls_process_read_to_clearance" lineno="512"> <summary> Make specified domain MLS trusted for reading from processes up to its clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_process_read_up" lineno="541"> <summary> Make specified domain MLS trusted for reading from processes at all levels. (Deprecated) </summary> <desc> <p> Make specified domain MLS trusted for reading from processes at all levels. </p> <p> This interface has been deprecated, please use mls_process_read_all_levels() instead. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="mls_process_read_all_levels" lineno="558"> <summary> Make specified domain MLS trusted for reading from processes at all levels. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_process_write_to_clearance" lineno="579"> <summary> Make specified domain MLS trusted for writing to processes up to its clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_process_write_down" lineno="608"> <summary> Make specified domain MLS trusted for writing to processes at all levels. (Deprecated) </summary> <desc> <p> Make specified domain MLS trusted for writing to processes at all levels. </p> <p> This interface has been deprecated, please use mls_process_write_all_levels() instead. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="mls_process_write_all_levels" lineno="625"> <summary> Make specified domain MLS trusted for writing to processes at all levels. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_process_set_level" lineno="646"> <summary> Make specified domain MLS trusted for setting the level of processes it executes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_xwin_read_to_clearance" lineno="666"> <summary> Make specified domain MLS trusted for reading from X objects up to its clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_xwin_read_all_levels" lineno="686"> <summary> Make specified domain MLS trusted for reading from X objects at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_xwin_write_to_clearance" lineno="706"> <summary> Make specified domain MLS trusted for write to X objects up to its clearance. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_xwin_write_all_levels" lineno="726"> <summary> Make specified domain MLS trusted for writing to X objects at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_colormap_read_all_levels" lineno="746"> <summary> Make specified domain MLS trusted for reading from X colormaps at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_colormap_write_all_levels" lineno="766"> <summary> Make specified domain MLS trusted for writing to X colormaps at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_trusted_object" lineno="795"> <summary> Make specified object MLS trusted. </summary> <desc> <p> Make specified object MLS trusted. This allows all levels to read and write the object. </p> <p> This currently only applies to filesystem objects, for example, files and directories. </p> </desc> <param name="domain"> <summary> The type of the object. </summary> </param> </interface> <interface name="mls_fd_use_all_levels" lineno="816"> <summary> Make the specified domain trusted to inherit and use file descriptors from all levels. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_fd_share_all_levels" lineno="837"> <summary> Make the file descriptors from the specifed domain inheritable by all levels. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_context_translate_all_levels" lineno="857"> <summary> Make specified domain MLS trusted for translating contexts at all levels. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_db_read_all_levels" lineno="877"> <summary> Make specified domain MLS trusted for reading from databases at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_db_write_all_levels" lineno="897"> <summary> Make specified domain MLS trusted for writing to databases at any level. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_db_upgrade" lineno="917"> <summary> Make specified domain MLS trusted for raising the level of databases. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_db_downgrade" lineno="937"> <summary> Make specified domain MLS trusted for lowering the level of databases. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_dbus_send_all_levels" lineno="957"> <summary> Make specified domain MLS trusted for sending dbus messages to all levels. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="mls_dbus_recv_all_levels" lineno="978"> <summary> Make specified domain MLS trusted for receiving dbus messages from all levels. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> </module> <module name="selinux" filename="policy/modules/kernel/selinux.if"> <summary> Policy for kernel security interface, in particular, selinuxfs. </summary> <required val="true"> Contains the policy for the kernel SELinux security interface. </required> <interface name="selinux_labeled_boolean" lineno="34"> <summary> Make the specified type used for labeling SELinux Booleans. This interface is only usable in the base module. </summary> <desc> <p> Make the specified type used for labeling SELinux Booleans. </p> <p> This makes use of genfscon statements, which are only available in the base module. Thus any module which calls this interface must be included in the base module. </p> </desc> <param name="type"> <summary> Type used for labeling a Boolean. </summary> </param> <param name="boolean"> <summary> Name of the Boolean. </summary> </param> </interface> <interface name="selinux_get_fs_mount" lineno="56"> <summary> Get the mountpoint of the selinuxfs filesystem. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="selinux_dontaudit_get_fs_mount" lineno="82"> <summary> Do not audit attempts to get the mountpoint of the selinuxfs filesystem. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="selinux_getattr_fs" lineno="107"> <summary> Get the attributes of the selinuxfs filesystem </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="selinux_dontaudit_getattr_fs" lineno="126"> <summary> Do not audit attempts to get the attributes of the selinuxfs filesystem </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="selinux_dontaudit_getattr_dir" lineno="145"> <summary> Do not audit attempts to get the attributes of the selinuxfs directory. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="selinux_search_fs" lineno="163"> <summary> Search selinuxfs. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="selinux_dontaudit_search_fs" lineno="181"> <summary> Do not audit attempts to search selinuxfs. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="selinux_dontaudit_read_fs" lineno="200"> <summary> Do not audit attempts to read generic selinuxfs entries </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="selinux_get_enforce_mode" lineno="222"> <summary> Allows the caller to get the mode of policy enforcement (enforcing or permissive mode). </summary> <param name="domain"> <summary> The process type to allow to get the enforcing mode. </summary> </param> <rolecap/> </interface> <interface name="selinux_set_enforce_mode" lineno="254"> <summary> Allow caller to set the mode of policy enforcement (enforcing or permissive mode). </summary> <desc> <p> Allow caller to set the mode of policy enforcement (enforcing or permissive mode). </p> <p> Since this is a security event, this action is always audited. </p> </desc> <param name="domain"> <summary> The process type to allow to set the enforcement mode. </summary> </param> <rolecap/> </interface> <interface name="selinux_load_policy" lineno="285"> <summary> Allow caller to load the policy into the kernel. </summary> <param name="domain"> <summary> The process type that will load the policy. </summary> </param> </interface> <interface name="selinux_read_policy" lineno="316"> <summary> Allow caller to read the policy from the kernel. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="selinux_set_boolean" lineno="353"> <summary> Allow caller to set the state of Booleans to enable or disable conditional portions of the policy. (Deprecated) </summary> <desc> <p> Allow caller to set the state of Booleans to enable or disable conditional portions of the policy. </p> <p> Since this is a security event, this action is always audited. </p> <p> This interface has been deprecated. Please use selinux_set_generic_booleans() or selinux_set_all_booleans() instead. </p> </desc> <param name="domain"> <summary> The process type allowed to set the Boolean. </summary> </param> <rolecap/> </interface> <interface name="selinux_set_generic_booleans" lineno="380"> <summary> Allow caller to set the state of generic Booleans to enable or disable conditional portions of the policy. </summary> <desc> <p> Allow caller to set the state of generic Booleans to enable or disable conditional portions of the policy. </p> <p> Since this is a security event, this action is always audited. </p> </desc> <param name="domain"> <summary> The process type allowed to set the Boolean. </summary> </param> <rolecap/> </interface> <interface name="selinux_set_all_booleans" lineno="421"> <summary> Allow caller to set the state of all Booleans to enable or disable conditional portions of the policy. </summary> <desc> <p> Allow caller to set the state of all Booleans to enable or disable conditional portions of the policy. </p> <p> Since this is a security event, this action is always audited. </p> </desc> <param name="domain"> <summary> The process type allowed to set the Boolean. </summary> </param> <rolecap/> </interface> <interface name="selinux_set_parameters" lineno="464"> <summary> Allow caller to set SELinux access vector cache parameters. </summary> <desc> <p> Allow caller to set SELinux access vector cache parameters. The allows the domain to set performance related parameters of the AVC, such as cache threshold. </p> <p> Since this is a security event, this action is always audited. </p> </desc> <param name="domain"> <summary> The process type to allow to set security parameters. </summary> </param> <rolecap/> </interface> <interface name="selinux_validate_context" lineno="488"> <summary> Allows caller to validate security contexts. </summary> <param name="domain"> <summary> The process type permitted to validate contexts. </summary> </param> <rolecap/> </interface> <interface name="selinux_dontaudit_validate_context" lineno="509"> <summary> Do not audit attempts to validate security contexts. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> <rolecap/> </interface> <interface name="selinux_compute_access_vector" lineno="530"> <summary> Allows caller to compute an access vector. </summary> <param name="domain"> <summary> The process type allowed to compute an access vector. </summary> </param> <rolecap/> </interface> <interface name="selinux_compute_create_context" lineno="551"> <summary> Calculate the default type for object creation. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="selinux_compute_member" lineno="572"> <summary> Allows caller to compute polyinstatntiated directory members. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="selinux_compute_relabel_context" lineno="601"> <summary> Calculate the context for relabeling objects. </summary> <desc> <p> Calculate the context for relabeling objects. This is determined by using the type_change rules in the policy, and is generally used for determining the context for relabeling a terminal when a user logs in. </p> </desc> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="selinux_compute_user_contexts" lineno="621"> <summary> Allows caller to compute possible contexts for a user. </summary> <param name="domain"> <summary> The process type allowed to compute user contexts. </summary> </param> </interface> <interface name="selinux_unconfined" lineno="641"> <summary> Unconfined access to the SELinux kernel security server. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="selinux_genbool" lineno="659"> <summary> Generate a file context for a boolean type </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="storage" filename="policy/modules/kernel/storage.if"> <summary>Policy controlling access to storage devices</summary> <interface name="storage_getattr_fixed_disk_dev" lineno="14"> <summary> Allow the caller to get the attributes of fixed disk device nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dontaudit_getattr_fixed_disk_dev" lineno="34"> <summary> Do not audit attempts made by the caller to get the attributes of fixed disk device nodes. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="storage_setattr_fixed_disk_dev" lineno="54"> <summary> Allow the caller to set the attributes of fixed disk device nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dontaudit_setattr_fixed_disk_dev" lineno="74"> <summary> Do not audit attempts made by the caller to set the attributes of fixed disk device nodes. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="storage_raw_read_fixed_disk" lineno="95"> <summary> Allow the caller to directly read from a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dontaudit_read_fixed_disk" lineno="120"> <summary> Do not audit attempts made by the caller to read fixed disk device nodes. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="storage_raw_write_fixed_disk" lineno="143"> <summary> Allow the caller to directly write to a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dontaudit_write_fixed_disk" lineno="166"> <summary> Do not audit attempts made by the caller to write fixed disk device nodes. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="storage_raw_rw_fixed_disk" lineno="188"> <summary> Allow the caller to directly read and write to a fixed disk. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="storage_create_fixed_disk_dev" lineno="203"> <summary> Allow the caller to create fixed disk device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="storage_delete_fixed_disk_dev" lineno="225"> <summary> Allow the caller to create fixed disk device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="storage_manage_fixed_disk" lineno="244"> <summary> Create, read, write, and delete fixed disk device nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dev_filetrans_fixed_disk" lineno="268"> <summary> Create block devices in /dev with the fixed disk type via an automatic type transition. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_tmpfs_filetrans_fixed_disk" lineno="288"> <summary> Create block devices in on a tmpfs filesystem with the fixed disk type via an automatic type transition. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_relabel_fixed_disk" lineno="306"> <summary> Relabel fixed disk device nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_swapon_fixed_disk" lineno="325"> <summary> Enable a fixed disk device as swap space </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_getattr_fuse_dev" lineno="345"> <summary> Allow the caller to get the attributes of device nodes of fuse devices. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_rw_fuse" lineno="364"> <summary> read or write fuse device interfaces. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="storage_dontaudit_rw_fuse" lineno="383"> <summary> Do not audit attempts to read or write fuse device interfaces. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="storage_getattr_scsi_generic_dev" lineno="402"> <summary> Allow the caller to get the attributes of the generic SCSI interface device nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_setattr_scsi_generic_dev" lineno="422"> <summary> Allow the caller to set the attributes of the generic SCSI interface device nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_read_scsi_generic" lineno="445"> <summary> Allow the caller to directly read, in a generic fashion, from any SCSI device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_write_scsi_generic" lineno="470"> <summary> Allow the caller to directly write, in a generic fashion, from any SCSI device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_setattr_scsi_generic_dev_dev" lineno="492"> <summary> Set attributes of the device nodes for the SCSI generic inerface. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dontaudit_rw_scsi_generic" lineno="512"> <summary> Do not audit attempts to read or write SCSI generic device interfaces. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="storage_getattr_removable_dev" lineno="531"> <summary> Allow the caller to get the attributes of removable devices device nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dontaudit_getattr_removable_dev" lineno="551"> <summary> Do not audit attempts made by the caller to get the attributes of removable devices device nodes. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="storage_dontaudit_read_removable_device" lineno="570"> <summary> Do not audit attempts made by the caller to read removable devices device nodes. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="storage_dontaudit_write_removable_device" lineno="590"> <summary> Do not audit attempts made by the caller to write removable devices device nodes. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="storage_setattr_removable_dev" lineno="610"> <summary> Allow the caller to set the attributes of removable devices device nodes. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dontaudit_setattr_removable_dev" lineno="630"> <summary> Do not audit attempts made by the caller to set the attributes of removable devices device nodes. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="storage_raw_read_removable_device" lineno="652"> <summary> Allow the caller to directly read from a removable device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dontaudit_raw_read_removable_device" lineno="671"> <summary> Do not audit attempts to directly read removable devices. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="storage_raw_write_removable_device" lineno="693"> <summary> Allow the caller to directly write to a removable device. This is extremly dangerous as it can bypass the SELinux protections for filesystem objects, and should only be used by trusted domains. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_dontaudit_raw_write_removable_device" lineno="712"> <summary> Do not audit attempts to directly write removable devices. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="storage_read_tape" lineno="731"> <summary> Allow the caller to directly read a tape device. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_write_tape" lineno="751"> <summary> Allow the caller to directly read a tape device. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_getattr_tape_dev" lineno="771"> <summary> Allow the caller to get the attributes of device nodes of tape devices. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_setattr_tape_dev" lineno="791"> <summary> Allow the caller to set the attributes of device nodes of tape devices. </summary> <param name="domain"> <summary> The type of the process performing this action. </summary> </param> </interface> <interface name="storage_unconfined" lineno="810"> <summary> Unconfined access to storage devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="terminal" filename="policy/modules/kernel/terminal.if"> <summary>Policy for terminals.</summary> <required val="true"> Depended on by other required modules. </required> <interface name="term_pty" lineno="16"> <summary> Transform specified type into a pty type. </summary> <param name="pty_type"> <summary> An object type that will applied to a pty. </summary> </param> </interface> <interface name="term_user_pty" lineno="45"> <summary> Transform specified type into an user pty type. This allows it to be relabeled via type change by login programs such as ssh. </summary> <param name="userdomain"> <summary> The type of the user domain associated with this pty. </summary> </param> <param name="object_type"> <summary> An object type that will applied to a pty. </summary> </param> </interface> <interface name="term_login_pty" lineno="65"> <summary> Transform specified type into a pty type used by login programs, such as sshd. </summary> <param name="pty_type"> <summary> An object type that will applied to a pty. </summary> </param> </interface> <interface name="term_tty" lineno="84"> <summary> Transform specified type into a tty type. </summary> <param name="tty_type"> <summary> An object type that will applied to a tty. </summary> </param> </interface> <interface name="term_user_tty" lineno="110"> <summary> Transform specified type into a user tty type. </summary> <param name="domain"> <summary> User domain that is related to this tty. </summary> </param> <param name="tty_type"> <summary> An object type that will applied to a tty. </summary> </param> </interface> <interface name="term_create_pty" lineno="142"> <summary> Create a pty in the /dev/pts directory. </summary> <param name="domain"> <summary> The type of the process creating the pty. </summary> </param> <param name="pty_type"> <summary> The type of the pty. </summary> </param> </interface> <interface name="term_write_all_terms" lineno="168"> <summary> Write the console, all ttys and all ptys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_use_all_terms" lineno="191"> <summary> Read and write the console, all ttys and all ptys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_write_console" lineno="213"> <summary> Write to the console. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_read_console" lineno="233"> <summary> Read from the console. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_read_console" lineno="253"> <summary> Do not audit attempts to read from the console. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_use_console" lineno="272"> <summary> Read from and write to the console. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_use_console" lineno="292"> <summary> Do not audit attemtps to read from or write to the console. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_setattr_console" lineno="314"> <summary> Set the attributes of the console device node. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_relabel_console" lineno="333"> <summary> Relabel from and to the console type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_relabel_devpts" lineno="352"> <summary> Relabel from and to the console type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_create_console_dev" lineno="371"> <summary> Create the console device (/dev/console). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_getattr_pty_fs" lineno="391"> <summary> Get the attributes of a pty filesystem </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_dontaudit_getattr_pty_dirs" lineno="410"> <summary> Do not audit attempts to get the attributes of the /dev/pts directory. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="term_search_ptys" lineno="428"> <summary> Search the contents of the /dev/pts directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_dontaudit_search_ptys" lineno="448"> <summary> Do not audit attempts to search the contents of the /dev/pts directory. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_list_ptys" lineno="468"> <summary> Read the /dev/pts directory to list all ptys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_dontaudit_list_ptys" lineno="488"> <summary> Do not audit attempts to read the /dev/pts directory. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="term_dontaudit_manage_pty_dirs" lineno="507"> <summary> Do not audit attempts to create, read, write, or delete the /dev/pts directory. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="term_dontaudit_getattr_generic_ptys" lineno="526"> <summary> Do not audit attempts to get the attributes of generic pty devices. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="term_ioctl_generic_ptys" lineno="544"> <summary> ioctl of generic pty devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_setattr_generic_ptys" lineno="566"> <summary> Allow setting the attributes of generic pty devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_dontaudit_setattr_generic_ptys" lineno="586"> <summary> Dontaudit setting the attributes of generic pty devices. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_use_generic_ptys" lineno="606"> <summary> Read and write the generic pty type. This is generally only used in the targeted policy. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_dontaudit_use_generic_ptys" lineno="628"> <summary> Dot not audit attempts to read and write the generic pty type. This is generally only used in the targeted policy. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="term_setattr_controlling_term" lineno="646"> <summary> Set the attributes of the tty device </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_use_controlling_term" lineno="666"> <summary> Read and write the controlling terminal (/dev/tty). </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_use_ptmx" lineno="685"> <summary> Read and write the pty multiplexor (/dev/ptmx). </summary> <param name="domain"> <summary> The type of the process to allow access. </summary> </param> </interface> <interface name="term_dontaudit_getattr_ptmx" lineno="705"> <summary> Do not audit attempts to get attributes on the pty multiplexor (/dev/ptmx). </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="term_dontaudit_use_ptmx" lineno="724"> <summary> Do not audit attempts to read and write the pty multiplexor (/dev/ptmx). </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="term_getattr_all_ptys" lineno="744"> <summary> Get the attributes of all pty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_getattr_all_ptys" lineno="767"> <summary> Do not audit attempts to get the attributes of any pty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_setattr_all_ptys" lineno="787"> <summary> Set the attributes of all pty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_relabelto_all_ptys" lineno="808"> <summary> Relabel to all ptys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_write_all_ptys" lineno="826"> <summary> Write to all ptys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_use_all_ptys" lineno="846"> <summary> Read and write all ptys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_use_all_ptys" lineno="867"> <summary> Do not audit attempts to read or write any ptys. </summary> <param name="domain"> <summary> Domain to not audit. </summary> </param> </interface> <interface name="term_relabel_all_ptys" lineno="885"> <summary> Relabel from and to all pty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_getattr_all_user_ptys" lineno="907"> <summary> Get the attributes of all user pty device nodes. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_getattr_all_user_ptys" lineno="924"> <summary> Do not audit attempts to get the attributes of any user pty device nodes. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_setattr_all_user_ptys" lineno="941"> <summary> Set the attributes of all user pty device nodes. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_relabelto_all_user_ptys" lineno="956"> <summary> Relabel to all user ptys. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_write_all_user_ptys" lineno="971"> <summary> Write to all user ptys. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_use_all_user_ptys" lineno="987"> <summary> Read and write all user ptys. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_use_all_user_ptys" lineno="1003"> <summary> Do not audit attempts to read any user ptys. (Deprecated) </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="term_relabel_all_user_ptys" lineno="1019"> <summary> Relabel from and to all user user pty device nodes. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_getattr_unallocated_ttys" lineno="1036"> <summary> Get the attributes of all unallocated tty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1056"> <summary> Do not audit attempts to get the attributes of all unallocated tty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_setattr_unallocated_ttys" lineno="1076"> <summary> Set the attributes of all unallocated tty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1096"> <summary> Do not audit attempts to set the attributes of unallocated tty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1115"> <summary> Do not audit attempts to ioctl unallocated tty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_relabel_unallocated_ttys" lineno="1134"> <summary> Relabel from and to the unallocated tty type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_reset_tty_labels" lineno="1154"> <summary> Relabel from all user tty types to the unallocated tty type. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_append_unallocated_ttys" lineno="1175"> <summary> Append to unallocated ttys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_write_unallocated_ttys" lineno="1194"> <summary> Write to unallocated ttys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_use_unallocated_ttys" lineno="1214"> <summary> Read and write unallocated ttys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_use_unallocated_ttys" lineno="1234"> <summary> Do not audit attempts to read or write unallocated ttys. </summary> <param name="domain"> <summary> The type of the process to not audit. </summary> </param> </interface> <interface name="term_getattr_all_ttys" lineno="1253"> <summary> Get the attributes of all tty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_getattr_all_ttys" lineno="1273"> <summary> Do not audit attempts to get the attributes of any tty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_setattr_all_ttys" lineno="1295"> <summary> Set the attributes of all tty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_relabel_all_ttys" lineno="1314"> <summary> Relabel from and to all tty device nodes. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_write_all_ttys" lineno="1333"> <summary> Write to all ttys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_use_all_ttys" lineno="1353"> <summary> Read and write all ttys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_use_all_ttys" lineno="1373"> <summary> Do not audit attempts to read or write any ttys. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_getattr_all_user_ttys" lineno="1393"> <summary> Get the attributes of all user tty device nodes. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_getattr_all_user_ttys" lineno="1410"> <summary> Do not audit attempts to get the attributes of any user tty device nodes. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_setattr_all_user_ttys" lineno="1427"> <summary> Set the attributes of all user tty device nodes. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_relabel_all_user_ttys" lineno="1443"> <summary> Relabel from and to all user user tty device nodes. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_write_all_user_ttys" lineno="1458"> <summary> Write to all user ttys. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_use_all_user_ttys" lineno="1474"> <summary> Read and write all user to all user ttys. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> <rolecap/> </interface> <interface name="term_dontaudit_use_all_user_ttys" lineno="1490"> <summary> Do not audit attempts to read or write any user ttys. (Deprecated) </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_getattr_virtio_console" lineno="1505"> <summary> Getattr on the virtio console. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> <interface name="term_use_virtio_console" lineno="1523"> <summary> Read from and write to the virtio console. </summary> <param name="domain"> <summary> Domain allowed access. </summary> </param> </interface> </module> <module name="ubac" filename="policy/modules/kernel/ubac.if"> <summary>User-based access control policy</summary> <required val="true"> Contains attributes used in UBAC policy. </required> <interface name="ubac_constrained" lineno="29"> <summary> Constrain by user-based access control (UBAC). </summary> <desc> <p> Constrain the specified type by user-based access control (UBAC). Typically, these are user processes or user files that need to be differentiated by SELinux user. Normally this does not include administrative or privileged programs. For the UBAC rules to be enforced, both the subject (source) type and the object (target) types must be UBAC constrained. </p> </desc> <param name="type"> <summary> Type to be constrained by UBAC. </summary> </param> <infoflow type="none"/> </interface> <interface name="ubac_file_exempt" lineno="47"> <summary> Exempt user-based access control for files. </summary> <param name="domain"> <summary> Domain to be exempted. </summary> </param> </interface> <interface name="ubac_process_exempt" lineno="65"> <summary> Exempt user-based access control for processes. </summary> <param name="domain"> <summary> Domain to be exempted. </summary> </param> </interface> <interface name="ubac_fd_exempt" lineno="83"> <summary> Exempt user-based access control for file descriptors. </summary> <param name="domain"> <summary> Domain to be exempted. </summary> </param> </interface> <interface name="ubac_socket_exempt" lineno="101"> <summary> Exempt user-based access control for sockets. </summary> <param name="domain"> <summary> Domain to be exempted. </summary> </param> </interface> <interface name="ubac_sysvipc_exempt" lineno="119"> <summary> Exempt user-based access control for SysV IPC. </summary> <param name="domain"> <summary> Domain to be exempted. </summary> </param> </interface> <interface name="ubac_xwin_exempt" lineno="137"> <summary> Exempt user-based access control for X Windows. </summary> <param name="domain"> <summary> Domain to be exempted. </summary> </param> </interface> <interface name="ubac_dbus_exempt" lineno="155"> <summary> Exempt user-based access control for dbus. </summary> <param name="domain"> <summary> Domain to be exempted. </summary> </param> </interface> <interface name="ubac_key_exempt" lineno="173"> <summary> Exempt user-based access control for keys. </summary> <param name="domain"> <summary> Domain to be exempted. </summary> </param> </interface> <interface name="ubac_db_exempt" lineno="191"> <summary> Exempt user-based access control for databases. </summary> <param name="domain"> <summary> Domain to be exempted. </summary> </param> </interface> </module> <module name="unlabelednet" filename="policy/modules/kernel/unlabelednet.if"> <summary> Policy for allowing confined domains to use unlabeled_t packets </summary> </module>y~or5J={Eeu磝Qk ᯘG{?+]ן?wM3X^歌>{7پK>on\jy Rg/=fOroNVv~Y+ NGuÝHWyw[eQʨSb> >}Gmx[o[<{Ϯ_qFvM IENDB`