?¡ëPNG
IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À?¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found
in /home/user1137782/www/china1.by/classwithtostring.php on line 86
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
Policy modules for kernel resources.
Core policy for shells, and generic programs
in /bin, /sbin, /usr/bin, and /usr/sbin.
Contains the base bin and sbin directory types
which need to be searched for the kernel to
run init.
Make the specified type usable for files
that are exectuables, such as binary programs.
This does not include shared libraries.
Type to be used for files.
Create a aliased type to generic bin files. (Deprecated)
Create a aliased type to generic bin files. (Deprecated)
This is added to support targeted policy. Its
use should be limited. It has no effect
on the strict policy.
Alias type for bin_t.
Make general progams in bin an entrypoint for
the specified domain.
The domain for which bin_t is an entrypoint.
Make general progams in sbin an entrypoint for
the specified domain. (Deprecated)
The domain for which sbin programs are an entrypoint.
Make the shell an entrypoint for the specified domain.
The domain for which the shell is an entrypoint.
Search the contents of bin directories.
Domain allowed access.
Do not audit attempts to search the contents of bin directories.
Domain allowed access.
List the contents of bin directories.
Domain allowed access.
Do not auidt attempts to write bin directories.
Domain allowed access.
Do not audit attempts to write bin files.
Domain to not audit.
Get the attributes of files in bin directories.
Domain allowed access.
Get the attributes of files in bin directories.
Domain allowed access.
Read files in bin directories.
Domain allowed access.
Read symbolic links in bin directories.
Domain allowed access.
Read pipes in bin directories.
Domain allowed access.
Read named sockets in bin directories.
Domain allowed access.
Execute generic programs in bin directories,
in the caller domain.
Allow the specified domain to execute generic programs
in system bin directories (/bin, /sbin, /usr/bin,
/usr/sbin) a without domain transition.
Typically, this interface should be used when the domain
executes general system progams within the privileges
of the source domain. Some examples of these programs
are ls, cp, sed, python, and tar. This does not include
shells, such as bash.
Related interface:
Domain allowed access.
Create, read, write, and delete bin files.
Domain allowed access.
Relabel to and from the bin type.
Domain allowed access.
Mmap a bin file as executable.
Domain allowed access.
Execute a file in a bin directory
in the specified domain but do not
do it automatically. This is an explicit
transition, requiring the caller to use setexeccon().
Execute a file in a bin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
the userhelper policy.
Domain allowed access.
The type of the new process.
Execute a file in a bin directory
in the specified domain.
Execute a file in a bin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
the ssh-agent policy.
Domain allowed access.
The type of the new process.
Search the contents of sbin directories. (Deprecated)
Domain allowed access.
Do not audit attempts to search
sbin directories. (Deprecated)
Domain to not audit.
List the contents of sbin directories. (Deprecated)
Domain allowed access.
Do not audit attempts to write
sbin directories. (Deprecated)
Domain to not audit.
Get the attributes of sbin files. (Deprecated)
Domain allowed access.
Do not audit attempts to get the attibutes
of sbin files. (Deprecated)
Domain to not audit.
Read files in sbin directories. (Deprecated)
Domain allowed access.
Read symbolic links in sbin directories. (Deprecated)
Domain allowed access.
Read named pipes in sbin directories. (Deprecated)
Domain allowed access.
Read named sockets in sbin directories. (Deprecated)
Domain allowed access.
Execute generic programs in sbin directories,
in the caller domain. (Deprecated)
Domain allowed access.
Create, read, write, and delete sbin files. (Deprecated)
Domain allowed access.
Relabel to and from the sbin type. (Deprecated)
Domain allowed access.
Mmap a sbin file as executable. (Deprecated)
Domain allowed access.
Execute a file in a sbin directory
in the specified domain. (Deprecated)
Execute a file in a sbin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested. (Deprecated)
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
the ssh-agent policy.
Domain allowed access.
The type of the new process.
Execute a file in a sbin directory
in the specified domain but do not
do it automatically. This is an explicit
transition, requiring the caller to use setexeccon(). (Deprecated)
Execute a file in a sbin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested. (Deprecated)
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
the userhelper policy.
Domain allowed access.
The type of the new process.
Check if a shell is executable (DAC-wise).
Domain allowed access.
Execute shells in the caller domain.
Allow the specified domain to execute shells without
a domain transition.
Typically, this interface should be used when the domain
executes shells within the privileges
of the source domain. Some examples of these programs
are bash, tcsh, and zsh.
Related interface:
Domain allowed access.
Execute ls in the caller domain. (Deprecated)
Domain allowed access.
Execute a shell in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
Execute a shell in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the shell process.
Execute a shell in the specified domain.
Execute a shell in the specified domain.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
Domain allowed access.
The type of the shell process.
Execute chroot in the caller domain.
Domain allowed access.
Get the attributes of all executable files.
Domain allowed access.
Read all executable files.
Domain allowed access.
Execute all executable files.
Domain allowed access.
Do not audit attempts to execute all executables.
Domain allowed access.
Create, read, write, and all executable files.
Domain allowed access.
Relabel to and from the bin type.
Domain allowed access.
Mmap all executables as executable.
Domain allowed access.
Policy controlling access to network objects
Contains the initial SIDs for network objects.
Define type to be a network packet type
Define type to be a network packet type
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for a network packet.
Define type to be a network port type
Define type to be a network port type
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for network ports.
Define network type to be a reserved port (lt 1024)
Define network type to be a reserved port (lt 1024)
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for network ports.
Define network type to be a rpc port ( 512 lt PORT lt 1024)
Define network type to be a rpc port ( 512 lt PORT lt 1024)
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for network ports.
Define type to be a network client packet type
Define type to be a network client packet type
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for a network client packet.
Define type to be a network server packet type
Define type to be a network server packet type
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
Type to be used for a network server packet.
Send and receive TCP network traffic on generic interfaces.
Allow the specified domain to send and receive TCP network
traffic on generic network interfaces.
Related interface:
- corenet_all_recvfrom_unlabeled()
- corenet_tcp_sendrecv_generic_node()
- corenet_tcp_sendrecv_all_ports()
- corenet_tcp_connect_all_ports()
Example client being able to connect to all ports over
generic nodes, without labeled networking:
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Send and receive TCP network traffic on loopback interface.
The type of the process performing this action.
Send UDP network traffic on generic interfaces.
The type of the process performing this action.
Dontaudit attempts to send UDP network traffic
on generic interfaces.
Domain to not audit.
Receive UDP network traffic on generic interfaces.
The type of the process performing this action.
Do not audit attempts to receive UDP network
traffic on generic interfaces.
Domain to not audit.
Send and receive UDP network traffic on generic interfaces.
Allow the specified domain to send and receive UDP network
traffic on generic network interfaces.
Related interface:
- corenet_all_recvfrom_unlabeled()
- corenet_udp_sendrecv_generic_node()
- corenet_udp_sendrecv_all_ports()
Example client being able to send to all ports over
generic nodes, without labeled networking:
allow myclient_t self:udp_socket create_socket_perms;
corenet_udp_sendrecv_generic_if(myclient_t)
corenet_udp_sendrecv_generic_node(myclient_t)
corenet_udp_sendrecv_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Do not audit attempts to send and receive UDP network
traffic on generic interfaces.
Domain to not audit.
Send raw IP packets on generic interfaces.
The type of the process performing this action.
Receive raw IP packets on generic interfaces.
The type of the process performing this action.
Send and receive raw IP packets on generic interfaces.
The type of the process performing this action.
Allow outgoing network traffic on the generic interfaces.
The peer label of the outgoing network traffic.
Allow incoming traffic on the generic interfaces.
The peer label of the incoming network traffic.
Allow incoming and outgoing network traffic on the generic interfaces.
The peer label of the network traffic.
Send and receive TCP network traffic on all interfaces.
The type of the process performing this action.
Send UDP network traffic on all interfaces.
The type of the process performing this action.
Receive UDP network traffic on all interfaces.
The type of the process performing this action.
Send and receive UDP network traffic on all interfaces.
The type of the process performing this action.
Send raw IP packets on all interfaces.
The type of the process performing this action.
Receive raw IP packets on all interfaces.
The type of the process performing this action.
Send and receive raw IP packets on all interfaces.
The type of the process performing this action.
Send and receive TCP network traffic on generic nodes.
Allow the specified domain to send and receive TCP network
traffic to/from generic network nodes (hostnames/networks).
Related interface:
- corenet_all_recvfrom_unlabeled()
- corenet_tcp_sendrecv_generic_if()
- corenet_tcp_sendrecv_all_ports()
- corenet_tcp_connect_all_ports()
Example client being able to connect to all ports over
generic nodes, without labeled networking:
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Send UDP network traffic on generic nodes.
The type of the process performing this action.
Receive UDP network traffic on generic nodes.
The type of the process performing this action.
Send and receive UDP network traffic on generic nodes.
Allow the specified domain to send and receive UDP network
traffic to/from generic network nodes (hostnames/networks).
Related interface:
- corenet_all_recvfrom_unlabeled()
- corenet_udp_sendrecv_generic_if()
- corenet_udp_sendrecv_all_ports()
Example client being able to send to all ports over
generic nodes, without labeled networking:
allow myclient_t self:udp_socket create_socket_perms;
corenet_udp_sendrecv_generic_if(myclient_t)
corenet_udp_sendrecv_generic_node(myclient_t)
corenet_udp_sendrecv_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Send raw IP packets on generic nodes.
The type of the process performing this action.
Receive raw IP packets on generic nodes.
The type of the process performing this action.
Send and receive raw IP packets on generic nodes.
The type of the process performing this action.
Bind TCP sockets to generic nodes.
Bind TCP sockets to generic nodes. This is
necessary for binding a socket so it
can be used for servers to listen
for incoming connections.
Related interface:
- corenet_udp_bind_generic_node()
Domain allowed access.
Bind UDP sockets to generic nodes.
Bind UDP sockets to generic nodes. This is
necessary for binding a socket so it
can be used for servers to listen
for incoming connections.
Related interface:
- corenet_tcp_bind_generic_node()
Domain allowed access.
Bind raw sockets to genric nodes.
The type of the process performing this action.
Allow outgoing network traffic to generic nodes.
The peer label of the outgoing network traffic.
Allow incoming network traffic from generic nodes.
The peer label of the incoming network traffic.
Allow incoming and outgoing network traffic with generic nodes.
The peer label of the network traffic.
Send and receive TCP network traffic on all nodes.
The type of the process performing this action.
Send UDP network traffic on all nodes.
The type of the process performing this action.
Do not audit attempts to send UDP network
traffic on any nodes.
Domain to not audit.
Receive UDP network traffic on all nodes.
The type of the process performing this action.
Do not audit attempts to receive UDP
network traffic on all nodes.
Domain to not audit.
Send and receive UDP network traffic on all nodes.
The type of the process performing this action.
Do not audit attempts to send and receive UDP
network traffic on any nodes nodes.
Domain to not audit.
Send raw IP packets on all nodes.
The type of the process performing this action.
Receive raw IP packets on all nodes.
The type of the process performing this action.
Send and receive raw IP packets on all nodes.
The type of the process performing this action.
Bind TCP sockets to all nodes.
The type of the process performing this action.
Bind UDP sockets to all nodes.
The type of the process performing this action.
Bind raw sockets to all nodes.
The type of the process performing this action.
Send and receive TCP network traffic on generic ports.
The type of the process performing this action.
Do not audit send and receive TCP network traffic on generic ports.
The type of the process performing this action.
Send UDP network traffic on generic ports.
The type of the process performing this action.
Receive UDP network traffic on generic ports.
The type of the process performing this action.
Send and receive UDP network traffic on generic ports.
The type of the process performing this action.
Bind TCP sockets to generic ports.
The type of the process performing this action.
Do not audit bind TCP sockets to generic ports.
Domain to not audit.
Bind UDP sockets to generic ports.
The type of the process performing this action.
Connect TCP sockets to generic ports.
The type of the process performing this action.
Send and receive TCP network traffic on all ports.
Send and receive TCP network traffic on all ports.
Related interfaces:
- corenet_all_recvfrom_unlabeled()
- corenet_tcp_sendrecv_generic_if()
- corenet_tcp_sendrecv_generic_node()
- corenet_tcp_connect_all_ports()
- corenet_tcp_bind_all_ports()
Example client being able to connect to all ports over
generic nodes, without labeled networking:
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Send UDP network traffic on all ports.
The type of the process performing this action.
Receive UDP network traffic on all ports.
The type of the process performing this action.
Send and receive UDP network traffic on all ports.
Send and receive UDP network traffic on all ports.
Related interfaces:
- corenet_all_recvfrom_unlabeled()
- corenet_udp_sendrecv_generic_if()
- corenet_udp_sendrecv_generic_node()
- corenet_udp_bind_all_ports()
Example client being able to send to all ports over
generic nodes, without labeled networking:
allow myclient_t self:udp_socket create_socket_perms;
corenet_udp_sendrecv_generic_if(myclient_t)
corenet_udp_sendrecv_generic_node(myclient_t)
corenet_udp_sendrecv_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Bind TCP sockets to all ports.
The type of the process performing this action.
Do not audit attepts to bind TCP sockets to any ports.
Domain to not audit.
Bind UDP sockets to all ports.
The type of the process performing this action.
Do not audit attepts to bind UDP sockets to any ports.
Domain to not audit.
Connect TCP sockets to all ports.
Connect TCP sockets to all ports
Related interfaces:
- corenet_all_recvfrom_unlabeled()
- corenet_tcp_sendrecv_generic_if()
- corenet_tcp_sendrecv_generic_node()
- corenet_tcp_sendrecv_all_ports()
- corenet_tcp_bind_all_ports()
Example client being able to connect to all ports over
generic nodes, without labeled networking:
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
Domain allowed access.
Do not audit attempts to connect TCP sockets
to all ports.
Domain to not audit.
Send and receive TCP network traffic on generic reserved ports.
The type of the process performing this action.
Send UDP network traffic on generic reserved ports.
The type of the process performing this action.
Receive UDP network traffic on generic reserved ports.
The type of the process performing this action.
Send and receive UDP network traffic on generic reserved ports.
The type of the process performing this action.
Bind TCP sockets to generic reserved ports.
The type of the process performing this action.
Bind UDP sockets to generic reserved ports.
The type of the process performing this action.
Connect TCP sockets to generic reserved ports.
The type of the process performing this action.
Send and receive TCP network traffic on all reserved ports.
The type of the process performing this action.
Send UDP network traffic on all reserved ports.
The type of the process performing this action.
Receive UDP network traffic on all reserved ports.
The type of the process performing this action.
Send and receive UDP network traffic on all reserved ports.
The type of the process performing this action.
Bind TCP sockets to all reserved ports.
The type of the process performing this action.
Do not audit attempts to bind TCP sockets to all reserved ports.
The type of the process to not audit.
Bind UDP sockets to all reserved ports.
The type of the process performing this action.
Do not audit attempts to bind UDP sockets to all reserved ports.
The type of the process to not audit.
Bind TCP sockets to all ports > 1024.
The type of the process performing this action.
Bind UDP sockets to all ports > 1024.
The type of the process performing this action.
Connect TCP sockets to reserved ports.
The type of the process performing this action.
Connect TCP sockets to all ports > 1024.
The type of the process performing this action.
Do not audit attempts to connect TCP sockets
all reserved ports.
Domain to not audit.
Connect TCP sockets to rpc ports.
The type of the process performing this action.
Do not audit attempts to connect TCP sockets
all rpc ports.
Domain to not audit.
Read and write the TUN/TAP virtual network device.
The domain allowed access.
Do not audit attempts to read or write the TUN/TAP
virtual network device.
Domain to not audit.
Getattr the point-to-point device.
The domain allowed access.
Read and write the point-to-point device.
The domain allowed access.
Bind TCP sockets to all RPC ports.
The type of the process performing this action.
Do not audit attempts to bind TCP sockets to all RPC ports.
The type of the process to not audit.
Bind UDP sockets to all RPC ports.
The type of the process performing this action.
Do not audit attempts to bind UDP sockets to all RPC ports.
The type of the process to not audit.
Send and receive messages on a
non-encrypted (no IPSEC) network
session.
Send and receive messages on a
non-encrypted (no IPSEC) network
session. (Deprecated)
The corenet_all_recvfrom_unlabeled() interface should be used instead
of this one.
Domain allowed access.
Do not audit attempts to send and receive
messages on a non-encrypted (no IPSEC) network
session.
Do not audit attempts to send and receive
messages on a non-encrypted (no IPSEC) network
session.
The corenet_dontaudit_all_recvfrom_unlabeled() interface should be
used instead of this one.
Domain to not audit.
Receive TCP packets from a NetLabel connection.
Domain allowed access.
Receive TCP packets from a NetLabel connection.
Domain allowed access.
Receive TCP packets from an unlabled connection.
Domain allowed access.
Do not audit attempts to receive TCP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive TCP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive TCP packets from an unlabeled
connection.
Domain to not audit.
Receive UDP packets from a NetLabel connection.
Domain allowed access.
Receive UDP packets from a NetLabel connection.
Domain allowed access.
Receive UDP packets from an unlabeled connection.
Domain allowed access.
Do not audit attempts to receive UDP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive UDP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive UDP packets from an unlabeled
connection.
Domain to not audit.
Receive Raw IP packets from a NetLabel connection.
Domain allowed access.
Receive Raw IP packets from a NetLabel connection.
Domain allowed access.
Receive Raw IP packets from an unlabeled connection.
Domain allowed access.
Do not audit attempts to receive Raw IP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive Raw IP packets from a NetLabel
connection.
Domain to not audit.
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
Domain to not audit.
Receive packets from an unlabeled connection.
Allow the specified domain to receive packets from an
unlabeled connection. On machines that do not utilize
labeled networking, this will be required on all
networking domains. On machines tha do utilize
labeled networking, this will be required for any
networking domain that is allowed to receive
network traffic that does not have a label.
Domain allowed access.
Receive packets from a NetLabel connection.
Allow the specified domain to receive NetLabel
network traffic, which utilizes the Commercial IP
Security Option (CIPSO) to set the MLS level
of the network packets. This is required for
all networking domains that receive NetLabel
network traffic.
Domain allowed access.
Enable unlabeled net packets
Allow unlabeled_packet_t to be used by all domains that use the network
Domain allowed access.
Do not audit attempts to receive packets from an unlabeled connection.
Domain allowed access.
Do not audit attempts to receive packets from a NetLabel
connection.
Domain to not audit.
Rules for receiving labeled TCP packets.
Rules for receiving labeled TCP packets.
Due to the nature of TCP, this is bidirectional.
Domain allowed access.
Peer domain.
Rules for receiving labeled UDP packets.
Domain allowed access.
Peer domain.
Rules for receiving labeled raw IP packets.
Domain allowed access.
Peer domain.
Rules for receiving labeled packets via TCP, UDP and raw IP.
Rules for receiving labeled packets via TCP, UDP and raw IP.
Due to the nature of TCP, the rules (for TCP
networking only) are bidirectional.
Domain allowed access.
Peer domain.
Send generic client packets.
Domain allowed access.
Receive generic client packets.
Domain allowed access.
Send and receive generic client packets.
Domain allowed access.
Relabel packets to the generic client packet type.
Domain allowed access.
Send generic server packets.
Domain allowed access.
Receive generic server packets.
Domain allowed access.
Send and receive generic server packets.
Domain allowed access.
Relabel packets to the generic server packet type.
Domain allowed access.
Send and receive unlabeled packets.
Send and receive unlabeled packets.
These packets do not match any netfilter
SECMARK rules.
Domain allowed access.
Send all client packets.
Domain allowed access.
Receive all client packets.
Domain allowed access.
Send and receive all client packets.
Domain allowed access.
Relabel packets to any client packet type.
Domain allowed access.
Send all server packets.
Domain allowed access.
Receive all server packets.
Domain allowed access.
Send and receive all server packets.
Domain allowed access.
Relabel packets to any server packet type.
Domain allowed access.
Send all packets.
Domain allowed access.
Receive all packets.
Domain allowed access.
Send and receive all packets.
Domain allowed access.
Relabel packets to any packet type.
Domain allowed access.
Unconfined access to network objects.
The domain allowed access.
Send and receive TCP traffic on the afs_bos port.
Domain allowed access.
Send UDP traffic on the afs_bos port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_bos port.
Domain to not audit.
Receive UDP traffic on the afs_bos port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_bos port.
Domain to not audit.
Send and receive UDP traffic on the afs_bos port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_bos port.
Domain to not audit.
Bind TCP sockets to the afs_bos port.
Domain allowed access.
Bind UDP sockets to the afs_bos port.
Domain allowed access.
Make a TCP connection to the afs_bos port.
Domain allowed access.
Send afs_bos_client packets.
Domain allowed access.
Do not audit attempts to send afs_bos_client packets.
Domain to not audit.
Receive afs_bos_client packets.
Domain allowed access.
Do not audit attempts to receive afs_bos_client packets.
Domain allowed access.
Send and receive afs_bos_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_bos_client packets.
Domain to not audit.
Relabel packets to afs_bos_client the packet type.
Domain allowed access.
Send afs_bos_server packets.
Domain allowed access.
Do not audit attempts to send afs_bos_server packets.
Domain to not audit.
Receive afs_bos_server packets.
Domain allowed access.
Do not audit attempts to receive afs_bos_server packets.
Domain allowed access.
Send and receive afs_bos_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_bos_server packets.
Domain to not audit.
Relabel packets to afs_bos_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_client port.
Domain allowed access.
Send UDP traffic on the afs_client port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_client port.
Domain to not audit.
Receive UDP traffic on the afs_client port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_client port.
Domain to not audit.
Send and receive UDP traffic on the afs_client port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_client port.
Domain to not audit.
Bind TCP sockets to the afs_client port.
Domain allowed access.
Bind UDP sockets to the afs_client port.
Domain allowed access.
Make a TCP connection to the afs_client port.
Domain allowed access.
Send afs_client_client packets.
Domain allowed access.
Do not audit attempts to send afs_client_client packets.
Domain to not audit.
Receive afs_client_client packets.
Domain allowed access.
Do not audit attempts to receive afs_client_client packets.
Domain allowed access.
Send and receive afs_client_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_client_client packets.
Domain to not audit.
Relabel packets to afs_client_client the packet type.
Domain allowed access.
Send afs_client_server packets.
Domain allowed access.
Do not audit attempts to send afs_client_server packets.
Domain to not audit.
Receive afs_client_server packets.
Domain allowed access.
Do not audit attempts to receive afs_client_server packets.
Domain allowed access.
Send and receive afs_client_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_client_server packets.
Domain to not audit.
Relabel packets to afs_client_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_fs port.
Domain allowed access.
Send UDP traffic on the afs_fs port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_fs port.
Domain to not audit.
Receive UDP traffic on the afs_fs port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_fs port.
Domain to not audit.
Send and receive UDP traffic on the afs_fs port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_fs port.
Domain to not audit.
Bind TCP sockets to the afs_fs port.
Domain allowed access.
Bind UDP sockets to the afs_fs port.
Domain allowed access.
Make a TCP connection to the afs_fs port.
Domain allowed access.
Send afs_fs_client packets.
Domain allowed access.
Do not audit attempts to send afs_fs_client packets.
Domain to not audit.
Receive afs_fs_client packets.
Domain allowed access.
Do not audit attempts to receive afs_fs_client packets.
Domain allowed access.
Send and receive afs_fs_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_fs_client packets.
Domain to not audit.
Relabel packets to afs_fs_client the packet type.
Domain allowed access.
Send afs_fs_server packets.
Domain allowed access.
Do not audit attempts to send afs_fs_server packets.
Domain to not audit.
Receive afs_fs_server packets.
Domain allowed access.
Do not audit attempts to receive afs_fs_server packets.
Domain allowed access.
Send and receive afs_fs_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_fs_server packets.
Domain to not audit.
Relabel packets to afs_fs_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_ka port.
Domain allowed access.
Send UDP traffic on the afs_ka port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_ka port.
Domain to not audit.
Receive UDP traffic on the afs_ka port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_ka port.
Domain to not audit.
Send and receive UDP traffic on the afs_ka port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_ka port.
Domain to not audit.
Bind TCP sockets to the afs_ka port.
Domain allowed access.
Bind UDP sockets to the afs_ka port.
Domain allowed access.
Make a TCP connection to the afs_ka port.
Domain allowed access.
Send afs_ka_client packets.
Domain allowed access.
Do not audit attempts to send afs_ka_client packets.
Domain to not audit.
Receive afs_ka_client packets.
Domain allowed access.
Do not audit attempts to receive afs_ka_client packets.
Domain allowed access.
Send and receive afs_ka_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_ka_client packets.
Domain to not audit.
Relabel packets to afs_ka_client the packet type.
Domain allowed access.
Send afs_ka_server packets.
Domain allowed access.
Do not audit attempts to send afs_ka_server packets.
Domain to not audit.
Receive afs_ka_server packets.
Domain allowed access.
Do not audit attempts to receive afs_ka_server packets.
Domain allowed access.
Send and receive afs_ka_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_ka_server packets.
Domain to not audit.
Relabel packets to afs_ka_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_pt port.
Domain allowed access.
Send UDP traffic on the afs_pt port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_pt port.
Domain to not audit.
Receive UDP traffic on the afs_pt port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_pt port.
Domain to not audit.
Send and receive UDP traffic on the afs_pt port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_pt port.
Domain to not audit.
Bind TCP sockets to the afs_pt port.
Domain allowed access.
Bind UDP sockets to the afs_pt port.
Domain allowed access.
Make a TCP connection to the afs_pt port.
Domain allowed access.
Send afs_pt_client packets.
Domain allowed access.
Do not audit attempts to send afs_pt_client packets.
Domain to not audit.
Receive afs_pt_client packets.
Domain allowed access.
Do not audit attempts to receive afs_pt_client packets.
Domain allowed access.
Send and receive afs_pt_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_pt_client packets.
Domain to not audit.
Relabel packets to afs_pt_client the packet type.
Domain allowed access.
Send afs_pt_server packets.
Domain allowed access.
Do not audit attempts to send afs_pt_server packets.
Domain to not audit.
Receive afs_pt_server packets.
Domain allowed access.
Do not audit attempts to receive afs_pt_server packets.
Domain allowed access.
Send and receive afs_pt_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_pt_server packets.
Domain to not audit.
Relabel packets to afs_pt_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the afs_vl port.
Domain allowed access.
Send UDP traffic on the afs_vl port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the afs_vl port.
Domain to not audit.
Receive UDP traffic on the afs_vl port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the afs_vl port.
Domain to not audit.
Send and receive UDP traffic on the afs_vl port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the afs_vl port.
Domain to not audit.
Bind TCP sockets to the afs_vl port.
Domain allowed access.
Bind UDP sockets to the afs_vl port.
Domain allowed access.
Make a TCP connection to the afs_vl port.
Domain allowed access.
Send afs_vl_client packets.
Domain allowed access.
Do not audit attempts to send afs_vl_client packets.
Domain to not audit.
Receive afs_vl_client packets.
Domain allowed access.
Do not audit attempts to receive afs_vl_client packets.
Domain allowed access.
Send and receive afs_vl_client packets.
Domain allowed access.
Do not audit attempts to send and receive afs_vl_client packets.
Domain to not audit.
Relabel packets to afs_vl_client the packet type.
Domain allowed access.
Send afs_vl_server packets.
Domain allowed access.
Do not audit attempts to send afs_vl_server packets.
Domain to not audit.
Receive afs_vl_server packets.
Domain allowed access.
Do not audit attempts to receive afs_vl_server packets.
Domain allowed access.
Send and receive afs_vl_server packets.
Domain allowed access.
Do not audit attempts to send and receive afs_vl_server packets.
Domain to not audit.
Relabel packets to afs_vl_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the agentx port.
Domain allowed access.
Send UDP traffic on the agentx port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the agentx port.
Domain to not audit.
Receive UDP traffic on the agentx port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the agentx port.
Domain to not audit.
Send and receive UDP traffic on the agentx port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the agentx port.
Domain to not audit.
Bind TCP sockets to the agentx port.
Domain allowed access.
Bind UDP sockets to the agentx port.
Domain allowed access.
Make a TCP connection to the agentx port.
Domain allowed access.
Send agentx_client packets.
Domain allowed access.
Do not audit attempts to send agentx_client packets.
Domain to not audit.
Receive agentx_client packets.
Domain allowed access.
Do not audit attempts to receive agentx_client packets.
Domain allowed access.
Send and receive agentx_client packets.
Domain allowed access.
Do not audit attempts to send and receive agentx_client packets.
Domain to not audit.
Relabel packets to agentx_client the packet type.
Domain allowed access.
Send agentx_server packets.
Domain allowed access.
Do not audit attempts to send agentx_server packets.
Domain to not audit.
Receive agentx_server packets.
Domain allowed access.
Do not audit attempts to receive agentx_server packets.
Domain allowed access.
Send and receive agentx_server packets.
Domain allowed access.
Do not audit attempts to send and receive agentx_server packets.
Domain to not audit.
Relabel packets to agentx_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the amanda port.
Domain allowed access.
Send UDP traffic on the amanda port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the amanda port.
Domain to not audit.
Receive UDP traffic on the amanda port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the amanda port.
Domain to not audit.
Send and receive UDP traffic on the amanda port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the amanda port.
Domain to not audit.
Bind TCP sockets to the amanda port.
Domain allowed access.
Bind UDP sockets to the amanda port.
Domain allowed access.
Make a TCP connection to the amanda port.
Domain allowed access.
Send amanda_client packets.
Domain allowed access.
Do not audit attempts to send amanda_client packets.
Domain to not audit.
Receive amanda_client packets.
Domain allowed access.
Do not audit attempts to receive amanda_client packets.
Domain allowed access.
Send and receive amanda_client packets.
Domain allowed access.
Do not audit attempts to send and receive amanda_client packets.
Domain to not audit.
Relabel packets to amanda_client the packet type.
Domain allowed access.
Send amanda_server packets.
Domain allowed access.
Do not audit attempts to send amanda_server packets.
Domain to not audit.
Receive amanda_server packets.
Domain allowed access.
Do not audit attempts to receive amanda_server packets.
Domain allowed access.
Send and receive amanda_server packets.
Domain allowed access.
Do not audit attempts to send and receive amanda_server packets.
Domain to not audit.
Relabel packets to amanda_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the amavisd_recv port.
Domain allowed access.
Send UDP traffic on the amavisd_recv port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the amavisd_recv port.
Domain to not audit.
Receive UDP traffic on the amavisd_recv port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the amavisd_recv port.
Domain to not audit.
Send and receive UDP traffic on the amavisd_recv port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the amavisd_recv port.
Domain to not audit.
Bind TCP sockets to the amavisd_recv port.
Domain allowed access.
Bind UDP sockets to the amavisd_recv port.
Domain allowed access.
Make a TCP connection to the amavisd_recv port.
Domain allowed access.
Send amavisd_recv_client packets.
Domain allowed access.
Do not audit attempts to send amavisd_recv_client packets.
Domain to not audit.
Receive amavisd_recv_client packets.
Domain allowed access.
Do not audit attempts to receive amavisd_recv_client packets.
Domain allowed access.
Send and receive amavisd_recv_client packets.
Domain allowed access.
Do not audit attempts to send and receive amavisd_recv_client packets.
Domain to not audit.
Relabel packets to amavisd_recv_client the packet type.
Domain allowed access.
Send amavisd_recv_server packets.
Domain allowed access.
Do not audit attempts to send amavisd_recv_server packets.
Domain to not audit.
Receive amavisd_recv_server packets.
Domain allowed access.
Do not audit attempts to receive amavisd_recv_server packets.
Domain allowed access.
Send and receive amavisd_recv_server packets.
Domain allowed access.
Do not audit attempts to send and receive amavisd_recv_server packets.
Domain to not audit.
Relabel packets to amavisd_recv_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the amavisd_send port.
Domain allowed access.
Send UDP traffic on the amavisd_send port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the amavisd_send port.
Domain to not audit.
Receive UDP traffic on the amavisd_send port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the amavisd_send port.
Domain to not audit.
Send and receive UDP traffic on the amavisd_send port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the amavisd_send port.
Domain to not audit.
Bind TCP sockets to the amavisd_send port.
Domain allowed access.
Bind UDP sockets to the amavisd_send port.
Domain allowed access.
Make a TCP connection to the amavisd_send port.
Domain allowed access.
Send amavisd_send_client packets.
Domain allowed access.
Do not audit attempts to send amavisd_send_client packets.
Domain to not audit.
Receive amavisd_send_client packets.
Domain allowed access.
Do not audit attempts to receive amavisd_send_client packets.
Domain allowed access.
Send and receive amavisd_send_client packets.
Domain allowed access.
Do not audit attempts to send and receive amavisd_send_client packets.
Domain to not audit.
Relabel packets to amavisd_send_client the packet type.
Domain allowed access.
Send amavisd_send_server packets.
Domain allowed access.
Do not audit attempts to send amavisd_send_server packets.
Domain to not audit.
Receive amavisd_send_server packets.
Domain allowed access.
Do not audit attempts to receive amavisd_send_server packets.
Domain allowed access.
Send and receive amavisd_send_server packets.
Domain allowed access.
Do not audit attempts to send and receive amavisd_send_server packets.
Domain to not audit.
Relabel packets to amavisd_send_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the amqp port.
Domain allowed access.
Send UDP traffic on the amqp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the amqp port.
Domain to not audit.
Receive UDP traffic on the amqp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the amqp port.
Domain to not audit.
Send and receive UDP traffic on the amqp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the amqp port.
Domain to not audit.
Bind TCP sockets to the amqp port.
Domain allowed access.
Bind UDP sockets to the amqp port.
Domain allowed access.
Make a TCP connection to the amqp port.
Domain allowed access.
Send amqp_client packets.
Domain allowed access.
Do not audit attempts to send amqp_client packets.
Domain to not audit.
Receive amqp_client packets.
Domain allowed access.
Do not audit attempts to receive amqp_client packets.
Domain allowed access.
Send and receive amqp_client packets.
Domain allowed access.
Do not audit attempts to send and receive amqp_client packets.
Domain to not audit.
Relabel packets to amqp_client the packet type.
Domain allowed access.
Send amqp_server packets.
Domain allowed access.
Do not audit attempts to send amqp_server packets.
Domain to not audit.
Receive amqp_server packets.
Domain allowed access.
Do not audit attempts to receive amqp_server packets.
Domain allowed access.
Send and receive amqp_server packets.
Domain allowed access.
Do not audit attempts to send and receive amqp_server packets.
Domain to not audit.
Relabel packets to amqp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the aol port.
Domain allowed access.
Send UDP traffic on the aol port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the aol port.
Domain to not audit.
Receive UDP traffic on the aol port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the aol port.
Domain to not audit.
Send and receive UDP traffic on the aol port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the aol port.
Domain to not audit.
Bind TCP sockets to the aol port.
Domain allowed access.
Bind UDP sockets to the aol port.
Domain allowed access.
Make a TCP connection to the aol port.
Domain allowed access.
Send aol_client packets.
Domain allowed access.
Do not audit attempts to send aol_client packets.
Domain to not audit.
Receive aol_client packets.
Domain allowed access.
Do not audit attempts to receive aol_client packets.
Domain allowed access.
Send and receive aol_client packets.
Domain allowed access.
Do not audit attempts to send and receive aol_client packets.
Domain to not audit.
Relabel packets to aol_client the packet type.
Domain allowed access.
Send aol_server packets.
Domain allowed access.
Do not audit attempts to send aol_server packets.
Domain to not audit.
Receive aol_server packets.
Domain allowed access.
Do not audit attempts to receive aol_server packets.
Domain allowed access.
Send and receive aol_server packets.
Domain allowed access.
Do not audit attempts to send and receive aol_server packets.
Domain to not audit.
Relabel packets to aol_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the apc port.
Domain allowed access.
Send UDP traffic on the apc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the apc port.
Domain to not audit.
Receive UDP traffic on the apc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the apc port.
Domain to not audit.
Send and receive UDP traffic on the apc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the apc port.
Domain to not audit.
Bind TCP sockets to the apc port.
Domain allowed access.
Bind UDP sockets to the apc port.
Domain allowed access.
Make a TCP connection to the apc port.
Domain allowed access.
Send apc_client packets.
Domain allowed access.
Do not audit attempts to send apc_client packets.
Domain to not audit.
Receive apc_client packets.
Domain allowed access.
Do not audit attempts to receive apc_client packets.
Domain allowed access.
Send and receive apc_client packets.
Domain allowed access.
Do not audit attempts to send and receive apc_client packets.
Domain to not audit.
Relabel packets to apc_client the packet type.
Domain allowed access.
Send apc_server packets.
Domain allowed access.
Do not audit attempts to send apc_server packets.
Domain to not audit.
Receive apc_server packets.
Domain allowed access.
Do not audit attempts to receive apc_server packets.
Domain allowed access.
Send and receive apc_server packets.
Domain allowed access.
Do not audit attempts to send and receive apc_server packets.
Domain to not audit.
Relabel packets to apc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the apcupsd port.
Domain allowed access.
Send UDP traffic on the apcupsd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the apcupsd port.
Domain to not audit.
Receive UDP traffic on the apcupsd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the apcupsd port.
Domain to not audit.
Send and receive UDP traffic on the apcupsd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the apcupsd port.
Domain to not audit.
Bind TCP sockets to the apcupsd port.
Domain allowed access.
Bind UDP sockets to the apcupsd port.
Domain allowed access.
Make a TCP connection to the apcupsd port.
Domain allowed access.
Send apcupsd_client packets.
Domain allowed access.
Do not audit attempts to send apcupsd_client packets.
Domain to not audit.
Receive apcupsd_client packets.
Domain allowed access.
Do not audit attempts to receive apcupsd_client packets.
Domain allowed access.
Send and receive apcupsd_client packets.
Domain allowed access.
Do not audit attempts to send and receive apcupsd_client packets.
Domain to not audit.
Relabel packets to apcupsd_client the packet type.
Domain allowed access.
Send apcupsd_server packets.
Domain allowed access.
Do not audit attempts to send apcupsd_server packets.
Domain to not audit.
Receive apcupsd_server packets.
Domain allowed access.
Do not audit attempts to receive apcupsd_server packets.
Domain allowed access.
Send and receive apcupsd_server packets.
Domain allowed access.
Do not audit attempts to send and receive apcupsd_server packets.
Domain to not audit.
Relabel packets to apcupsd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the apertus_ldp port.
Domain allowed access.
Send UDP traffic on the apertus_ldp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the apertus_ldp port.
Domain to not audit.
Receive UDP traffic on the apertus_ldp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the apertus_ldp port.
Domain to not audit.
Send and receive UDP traffic on the apertus_ldp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the apertus_ldp port.
Domain to not audit.
Bind TCP sockets to the apertus_ldp port.
Domain allowed access.
Bind UDP sockets to the apertus_ldp port.
Domain allowed access.
Make a TCP connection to the apertus_ldp port.
Domain allowed access.
Send apertus_ldp_client packets.
Domain allowed access.
Do not audit attempts to send apertus_ldp_client packets.
Domain to not audit.
Receive apertus_ldp_client packets.
Domain allowed access.
Do not audit attempts to receive apertus_ldp_client packets.
Domain allowed access.
Send and receive apertus_ldp_client packets.
Domain allowed access.
Do not audit attempts to send and receive apertus_ldp_client packets.
Domain to not audit.
Relabel packets to apertus_ldp_client the packet type.
Domain allowed access.
Send apertus_ldp_server packets.
Domain allowed access.
Do not audit attempts to send apertus_ldp_server packets.
Domain to not audit.
Receive apertus_ldp_server packets.
Domain allowed access.
Do not audit attempts to receive apertus_ldp_server packets.
Domain allowed access.
Send and receive apertus_ldp_server packets.
Domain allowed access.
Do not audit attempts to send and receive apertus_ldp_server packets.
Domain to not audit.
Relabel packets to apertus_ldp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the asterisk port.
Domain allowed access.
Send UDP traffic on the asterisk port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the asterisk port.
Domain to not audit.
Receive UDP traffic on the asterisk port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the asterisk port.
Domain to not audit.
Send and receive UDP traffic on the asterisk port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the asterisk port.
Domain to not audit.
Bind TCP sockets to the asterisk port.
Domain allowed access.
Bind UDP sockets to the asterisk port.
Domain allowed access.
Make a TCP connection to the asterisk port.
Domain allowed access.
Send asterisk_client packets.
Domain allowed access.
Do not audit attempts to send asterisk_client packets.
Domain to not audit.
Receive asterisk_client packets.
Domain allowed access.
Do not audit attempts to receive asterisk_client packets.
Domain allowed access.
Send and receive asterisk_client packets.
Domain allowed access.
Do not audit attempts to send and receive asterisk_client packets.
Domain to not audit.
Relabel packets to asterisk_client the packet type.
Domain allowed access.
Send asterisk_server packets.
Domain allowed access.
Do not audit attempts to send asterisk_server packets.
Domain to not audit.
Receive asterisk_server packets.
Domain allowed access.
Do not audit attempts to receive asterisk_server packets.
Domain allowed access.
Send and receive asterisk_server packets.
Domain allowed access.
Do not audit attempts to send and receive asterisk_server packets.
Domain to not audit.
Relabel packets to asterisk_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the audit port.
Domain allowed access.
Send UDP traffic on the audit port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the audit port.
Domain to not audit.
Receive UDP traffic on the audit port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the audit port.
Domain to not audit.
Send and receive UDP traffic on the audit port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the audit port.
Domain to not audit.
Bind TCP sockets to the audit port.
Domain allowed access.
Bind UDP sockets to the audit port.
Domain allowed access.
Make a TCP connection to the audit port.
Domain allowed access.
Send audit_client packets.
Domain allowed access.
Do not audit attempts to send audit_client packets.
Domain to not audit.
Receive audit_client packets.
Domain allowed access.
Do not audit attempts to receive audit_client packets.
Domain allowed access.
Send and receive audit_client packets.
Domain allowed access.
Do not audit attempts to send and receive audit_client packets.
Domain to not audit.
Relabel packets to audit_client the packet type.
Domain allowed access.
Send audit_server packets.
Domain allowed access.
Do not audit attempts to send audit_server packets.
Domain to not audit.
Receive audit_server packets.
Domain allowed access.
Do not audit attempts to receive audit_server packets.
Domain allowed access.
Send and receive audit_server packets.
Domain allowed access.
Do not audit attempts to send and receive audit_server packets.
Domain to not audit.
Relabel packets to audit_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the auth port.
Domain allowed access.
Send UDP traffic on the auth port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the auth port.
Domain to not audit.
Receive UDP traffic on the auth port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the auth port.
Domain to not audit.
Send and receive UDP traffic on the auth port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the auth port.
Domain to not audit.
Bind TCP sockets to the auth port.
Domain allowed access.
Bind UDP sockets to the auth port.
Domain allowed access.
Make a TCP connection to the auth port.
Domain allowed access.
Send auth_client packets.
Domain allowed access.
Do not audit attempts to send auth_client packets.
Domain to not audit.
Receive auth_client packets.
Domain allowed access.
Do not audit attempts to receive auth_client packets.
Domain allowed access.
Send and receive auth_client packets.
Domain allowed access.
Do not audit attempts to send and receive auth_client packets.
Domain to not audit.
Relabel packets to auth_client the packet type.
Domain allowed access.
Send auth_server packets.
Domain allowed access.
Do not audit attempts to send auth_server packets.
Domain to not audit.
Receive auth_server packets.
Domain allowed access.
Do not audit attempts to receive auth_server packets.
Domain allowed access.
Send and receive auth_server packets.
Domain allowed access.
Do not audit attempts to send and receive auth_server packets.
Domain to not audit.
Relabel packets to auth_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the bacula port.
Domain allowed access.
Send UDP traffic on the bacula port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the bacula port.
Domain to not audit.
Receive UDP traffic on the bacula port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the bacula port.
Domain to not audit.
Send and receive UDP traffic on the bacula port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the bacula port.
Domain to not audit.
Bind TCP sockets to the bacula port.
Domain allowed access.
Bind UDP sockets to the bacula port.
Domain allowed access.
Make a TCP connection to the bacula port.
Domain allowed access.
Send bacula_client packets.
Domain allowed access.
Do not audit attempts to send bacula_client packets.
Domain to not audit.
Receive bacula_client packets.
Domain allowed access.
Do not audit attempts to receive bacula_client packets.
Domain allowed access.
Send and receive bacula_client packets.
Domain allowed access.
Do not audit attempts to send and receive bacula_client packets.
Domain to not audit.
Relabel packets to bacula_client the packet type.
Domain allowed access.
Send bacula_server packets.
Domain allowed access.
Do not audit attempts to send bacula_server packets.
Domain to not audit.
Receive bacula_server packets.
Domain allowed access.
Do not audit attempts to receive bacula_server packets.
Domain allowed access.
Send and receive bacula_server packets.
Domain allowed access.
Do not audit attempts to send and receive bacula_server packets.
Domain to not audit.
Relabel packets to bacula_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the bgp port.
Domain allowed access.
Send UDP traffic on the bgp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the bgp port.
Domain to not audit.
Receive UDP traffic on the bgp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the bgp port.
Domain to not audit.
Send and receive UDP traffic on the bgp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the bgp port.
Domain to not audit.
Bind TCP sockets to the bgp port.
Domain allowed access.
Bind UDP sockets to the bgp port.
Domain allowed access.
Make a TCP connection to the bgp port.
Domain allowed access.
Send bgp_client packets.
Domain allowed access.
Do not audit attempts to send bgp_client packets.
Domain to not audit.
Receive bgp_client packets.
Domain allowed access.
Do not audit attempts to receive bgp_client packets.
Domain allowed access.
Send and receive bgp_client packets.
Domain allowed access.
Do not audit attempts to send and receive bgp_client packets.
Domain to not audit.
Relabel packets to bgp_client the packet type.
Domain allowed access.
Send bgp_server packets.
Domain allowed access.
Do not audit attempts to send bgp_server packets.
Domain to not audit.
Receive bgp_server packets.
Domain allowed access.
Do not audit attempts to receive bgp_server packets.
Domain allowed access.
Send and receive bgp_server packets.
Domain allowed access.
Do not audit attempts to send and receive bgp_server packets.
Domain to not audit.
Relabel packets to bgp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the boinc port.
Domain allowed access.
Send UDP traffic on the boinc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the boinc port.
Domain to not audit.
Receive UDP traffic on the boinc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the boinc port.
Domain to not audit.
Send and receive UDP traffic on the boinc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the boinc port.
Domain to not audit.
Bind TCP sockets to the boinc port.
Domain allowed access.
Bind UDP sockets to the boinc port.
Domain allowed access.
Make a TCP connection to the boinc port.
Domain allowed access.
Send boinc_client packets.
Domain allowed access.
Do not audit attempts to send boinc_client packets.
Domain to not audit.
Receive boinc_client packets.
Domain allowed access.
Do not audit attempts to receive boinc_client packets.
Domain allowed access.
Send and receive boinc_client packets.
Domain allowed access.
Do not audit attempts to send and receive boinc_client packets.
Domain to not audit.
Relabel packets to boinc_client the packet type.
Domain allowed access.
Send boinc_server packets.
Domain allowed access.
Do not audit attempts to send boinc_server packets.
Domain to not audit.
Receive boinc_server packets.
Domain allowed access.
Do not audit attempts to receive boinc_server packets.
Domain allowed access.
Send and receive boinc_server packets.
Domain allowed access.
Do not audit attempts to send and receive boinc_server packets.
Domain to not audit.
Relabel packets to boinc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the certmaster port.
Domain allowed access.
Send UDP traffic on the certmaster port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the certmaster port.
Domain to not audit.
Receive UDP traffic on the certmaster port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the certmaster port.
Domain to not audit.
Send and receive UDP traffic on the certmaster port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the certmaster port.
Domain to not audit.
Bind TCP sockets to the certmaster port.
Domain allowed access.
Bind UDP sockets to the certmaster port.
Domain allowed access.
Make a TCP connection to the certmaster port.
Domain allowed access.
Send certmaster_client packets.
Domain allowed access.
Do not audit attempts to send certmaster_client packets.
Domain to not audit.
Receive certmaster_client packets.
Domain allowed access.
Do not audit attempts to receive certmaster_client packets.
Domain allowed access.
Send and receive certmaster_client packets.
Domain allowed access.
Do not audit attempts to send and receive certmaster_client packets.
Domain to not audit.
Relabel packets to certmaster_client the packet type.
Domain allowed access.
Send certmaster_server packets.
Domain allowed access.
Do not audit attempts to send certmaster_server packets.
Domain to not audit.
Receive certmaster_server packets.
Domain allowed access.
Do not audit attempts to receive certmaster_server packets.
Domain allowed access.
Send and receive certmaster_server packets.
Domain allowed access.
Do not audit attempts to send and receive certmaster_server packets.
Domain to not audit.
Relabel packets to certmaster_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cockpit port.
Domain allowed access.
Send UDP traffic on the cockpit port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cockpit port.
Domain to not audit.
Receive UDP traffic on the cockpit port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cockpit port.
Domain to not audit.
Send and receive UDP traffic on the cockpit port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cockpit port.
Domain to not audit.
Bind TCP sockets to the cockpit port.
Domain allowed access.
Bind UDP sockets to the cockpit port.
Domain allowed access.
Make a TCP connection to the cockpit port.
Domain allowed access.
Send cockpit_client packets.
Domain allowed access.
Do not audit attempts to send cockpit_client packets.
Domain to not audit.
Receive cockpit_client packets.
Domain allowed access.
Do not audit attempts to receive cockpit_client packets.
Domain allowed access.
Send and receive cockpit_client packets.
Domain allowed access.
Do not audit attempts to send and receive cockpit_client packets.
Domain to not audit.
Relabel packets to cockpit_client the packet type.
Domain allowed access.
Send cockpit_server packets.
Domain allowed access.
Do not audit attempts to send cockpit_server packets.
Domain to not audit.
Receive cockpit_server packets.
Domain allowed access.
Do not audit attempts to receive cockpit_server packets.
Domain allowed access.
Send and receive cockpit_server packets.
Domain allowed access.
Do not audit attempts to send and receive cockpit_server packets.
Domain to not audit.
Relabel packets to cockpit_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the collectd port.
Domain allowed access.
Send UDP traffic on the collectd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the collectd port.
Domain to not audit.
Receive UDP traffic on the collectd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the collectd port.
Domain to not audit.
Send and receive UDP traffic on the collectd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the collectd port.
Domain to not audit.
Bind TCP sockets to the collectd port.
Domain allowed access.
Bind UDP sockets to the collectd port.
Domain allowed access.
Make a TCP connection to the collectd port.
Domain allowed access.
Send collectd_client packets.
Domain allowed access.
Do not audit attempts to send collectd_client packets.
Domain to not audit.
Receive collectd_client packets.
Domain allowed access.
Do not audit attempts to receive collectd_client packets.
Domain allowed access.
Send and receive collectd_client packets.
Domain allowed access.
Do not audit attempts to send and receive collectd_client packets.
Domain to not audit.
Relabel packets to collectd_client the packet type.
Domain allowed access.
Send collectd_server packets.
Domain allowed access.
Do not audit attempts to send collectd_server packets.
Domain to not audit.
Receive collectd_server packets.
Domain allowed access.
Do not audit attempts to receive collectd_server packets.
Domain allowed access.
Send and receive collectd_server packets.
Domain allowed access.
Do not audit attempts to send and receive collectd_server packets.
Domain to not audit.
Relabel packets to collectd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the chronyd port.
Domain allowed access.
Send UDP traffic on the chronyd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the chronyd port.
Domain to not audit.
Receive UDP traffic on the chronyd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the chronyd port.
Domain to not audit.
Send and receive UDP traffic on the chronyd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the chronyd port.
Domain to not audit.
Bind TCP sockets to the chronyd port.
Domain allowed access.
Bind UDP sockets to the chronyd port.
Domain allowed access.
Make a TCP connection to the chronyd port.
Domain allowed access.
Send chronyd_client packets.
Domain allowed access.
Do not audit attempts to send chronyd_client packets.
Domain to not audit.
Receive chronyd_client packets.
Domain allowed access.
Do not audit attempts to receive chronyd_client packets.
Domain allowed access.
Send and receive chronyd_client packets.
Domain allowed access.
Do not audit attempts to send and receive chronyd_client packets.
Domain to not audit.
Relabel packets to chronyd_client the packet type.
Domain allowed access.
Send chronyd_server packets.
Domain allowed access.
Do not audit attempts to send chronyd_server packets.
Domain to not audit.
Receive chronyd_server packets.
Domain allowed access.
Do not audit attempts to receive chronyd_server packets.
Domain allowed access.
Send and receive chronyd_server packets.
Domain allowed access.
Do not audit attempts to send and receive chronyd_server packets.
Domain to not audit.
Relabel packets to chronyd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the clamd port.
Domain allowed access.
Send UDP traffic on the clamd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the clamd port.
Domain to not audit.
Receive UDP traffic on the clamd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the clamd port.
Domain to not audit.
Send and receive UDP traffic on the clamd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the clamd port.
Domain to not audit.
Bind TCP sockets to the clamd port.
Domain allowed access.
Bind UDP sockets to the clamd port.
Domain allowed access.
Make a TCP connection to the clamd port.
Domain allowed access.
Send clamd_client packets.
Domain allowed access.
Do not audit attempts to send clamd_client packets.
Domain to not audit.
Receive clamd_client packets.
Domain allowed access.
Do not audit attempts to receive clamd_client packets.
Domain allowed access.
Send and receive clamd_client packets.
Domain allowed access.
Do not audit attempts to send and receive clamd_client packets.
Domain to not audit.
Relabel packets to clamd_client the packet type.
Domain allowed access.
Send clamd_server packets.
Domain allowed access.
Do not audit attempts to send clamd_server packets.
Domain to not audit.
Receive clamd_server packets.
Domain allowed access.
Do not audit attempts to receive clamd_server packets.
Domain allowed access.
Send and receive clamd_server packets.
Domain allowed access.
Do not audit attempts to send and receive clamd_server packets.
Domain to not audit.
Relabel packets to clamd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the clockspeed port.
Domain allowed access.
Send UDP traffic on the clockspeed port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the clockspeed port.
Domain to not audit.
Receive UDP traffic on the clockspeed port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the clockspeed port.
Domain to not audit.
Send and receive UDP traffic on the clockspeed port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the clockspeed port.
Domain to not audit.
Bind TCP sockets to the clockspeed port.
Domain allowed access.
Bind UDP sockets to the clockspeed port.
Domain allowed access.
Make a TCP connection to the clockspeed port.
Domain allowed access.
Send clockspeed_client packets.
Domain allowed access.
Do not audit attempts to send clockspeed_client packets.
Domain to not audit.
Receive clockspeed_client packets.
Domain allowed access.
Do not audit attempts to receive clockspeed_client packets.
Domain allowed access.
Send and receive clockspeed_client packets.
Domain allowed access.
Do not audit attempts to send and receive clockspeed_client packets.
Domain to not audit.
Relabel packets to clockspeed_client the packet type.
Domain allowed access.
Send clockspeed_server packets.
Domain allowed access.
Do not audit attempts to send clockspeed_server packets.
Domain to not audit.
Receive clockspeed_server packets.
Domain allowed access.
Do not audit attempts to receive clockspeed_server packets.
Domain allowed access.
Send and receive clockspeed_server packets.
Domain allowed access.
Do not audit attempts to send and receive clockspeed_server packets.
Domain to not audit.
Relabel packets to clockspeed_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cluster port.
Domain allowed access.
Send UDP traffic on the cluster port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cluster port.
Domain to not audit.
Receive UDP traffic on the cluster port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cluster port.
Domain to not audit.
Send and receive UDP traffic on the cluster port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cluster port.
Domain to not audit.
Bind TCP sockets to the cluster port.
Domain allowed access.
Bind UDP sockets to the cluster port.
Domain allowed access.
Make a TCP connection to the cluster port.
Domain allowed access.
Send cluster_client packets.
Domain allowed access.
Do not audit attempts to send cluster_client packets.
Domain to not audit.
Receive cluster_client packets.
Domain allowed access.
Do not audit attempts to receive cluster_client packets.
Domain allowed access.
Send and receive cluster_client packets.
Domain allowed access.
Do not audit attempts to send and receive cluster_client packets.
Domain to not audit.
Relabel packets to cluster_client the packet type.
Domain allowed access.
Send cluster_server packets.
Domain allowed access.
Do not audit attempts to send cluster_server packets.
Domain to not audit.
Receive cluster_server packets.
Domain allowed access.
Do not audit attempts to receive cluster_server packets.
Domain allowed access.
Send and receive cluster_server packets.
Domain allowed access.
Do not audit attempts to send and receive cluster_server packets.
Domain to not audit.
Relabel packets to cluster_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cma port.
Domain allowed access.
Send UDP traffic on the cma port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cma port.
Domain to not audit.
Receive UDP traffic on the cma port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cma port.
Domain to not audit.
Send and receive UDP traffic on the cma port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cma port.
Domain to not audit.
Bind TCP sockets to the cma port.
Domain allowed access.
Bind UDP sockets to the cma port.
Domain allowed access.
Make a TCP connection to the cma port.
Domain allowed access.
Send cma_client packets.
Domain allowed access.
Do not audit attempts to send cma_client packets.
Domain to not audit.
Receive cma_client packets.
Domain allowed access.
Do not audit attempts to receive cma_client packets.
Domain allowed access.
Send and receive cma_client packets.
Domain allowed access.
Do not audit attempts to send and receive cma_client packets.
Domain to not audit.
Relabel packets to cma_client the packet type.
Domain allowed access.
Send cma_server packets.
Domain allowed access.
Do not audit attempts to send cma_server packets.
Domain to not audit.
Receive cma_server packets.
Domain allowed access.
Do not audit attempts to receive cma_server packets.
Domain allowed access.
Send and receive cma_server packets.
Domain allowed access.
Do not audit attempts to send and receive cma_server packets.
Domain to not audit.
Relabel packets to cma_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cobbler port.
Domain allowed access.
Send UDP traffic on the cobbler port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cobbler port.
Domain to not audit.
Receive UDP traffic on the cobbler port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cobbler port.
Domain to not audit.
Send and receive UDP traffic on the cobbler port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cobbler port.
Domain to not audit.
Bind TCP sockets to the cobbler port.
Domain allowed access.
Bind UDP sockets to the cobbler port.
Domain allowed access.
Make a TCP connection to the cobbler port.
Domain allowed access.
Send cobbler_client packets.
Domain allowed access.
Do not audit attempts to send cobbler_client packets.
Domain to not audit.
Receive cobbler_client packets.
Domain allowed access.
Do not audit attempts to receive cobbler_client packets.
Domain allowed access.
Send and receive cobbler_client packets.
Domain allowed access.
Do not audit attempts to send and receive cobbler_client packets.
Domain to not audit.
Relabel packets to cobbler_client the packet type.
Domain allowed access.
Send cobbler_server packets.
Domain allowed access.
Do not audit attempts to send cobbler_server packets.
Domain to not audit.
Receive cobbler_server packets.
Domain allowed access.
Do not audit attempts to receive cobbler_server packets.
Domain allowed access.
Send and receive cobbler_server packets.
Domain allowed access.
Do not audit attempts to send and receive cobbler_server packets.
Domain to not audit.
Relabel packets to cobbler_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the commplex port.
Domain allowed access.
Send UDP traffic on the commplex port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the commplex port.
Domain to not audit.
Receive UDP traffic on the commplex port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the commplex port.
Domain to not audit.
Send and receive UDP traffic on the commplex port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the commplex port.
Domain to not audit.
Bind TCP sockets to the commplex port.
Domain allowed access.
Bind UDP sockets to the commplex port.
Domain allowed access.
Make a TCP connection to the commplex port.
Domain allowed access.
Send commplex_client packets.
Domain allowed access.
Do not audit attempts to send commplex_client packets.
Domain to not audit.
Receive commplex_client packets.
Domain allowed access.
Do not audit attempts to receive commplex_client packets.
Domain allowed access.
Send and receive commplex_client packets.
Domain allowed access.
Do not audit attempts to send and receive commplex_client packets.
Domain to not audit.
Relabel packets to commplex_client the packet type.
Domain allowed access.
Send commplex_server packets.
Domain allowed access.
Do not audit attempts to send commplex_server packets.
Domain to not audit.
Receive commplex_server packets.
Domain allowed access.
Do not audit attempts to receive commplex_server packets.
Domain allowed access.
Send and receive commplex_server packets.
Domain allowed access.
Do not audit attempts to send and receive commplex_server packets.
Domain to not audit.
Relabel packets to commplex_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the comsat port.
Domain allowed access.
Send UDP traffic on the comsat port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the comsat port.
Domain to not audit.
Receive UDP traffic on the comsat port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the comsat port.
Domain to not audit.
Send and receive UDP traffic on the comsat port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the comsat port.
Domain to not audit.
Bind TCP sockets to the comsat port.
Domain allowed access.
Bind UDP sockets to the comsat port.
Domain allowed access.
Make a TCP connection to the comsat port.
Domain allowed access.
Send comsat_client packets.
Domain allowed access.
Do not audit attempts to send comsat_client packets.
Domain to not audit.
Receive comsat_client packets.
Domain allowed access.
Do not audit attempts to receive comsat_client packets.
Domain allowed access.
Send and receive comsat_client packets.
Domain allowed access.
Do not audit attempts to send and receive comsat_client packets.
Domain to not audit.
Relabel packets to comsat_client the packet type.
Domain allowed access.
Send comsat_server packets.
Domain allowed access.
Do not audit attempts to send comsat_server packets.
Domain to not audit.
Receive comsat_server packets.
Domain allowed access.
Do not audit attempts to receive comsat_server packets.
Domain allowed access.
Send and receive comsat_server packets.
Domain allowed access.
Do not audit attempts to send and receive comsat_server packets.
Domain to not audit.
Relabel packets to comsat_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the condor port.
Domain allowed access.
Send UDP traffic on the condor port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the condor port.
Domain to not audit.
Receive UDP traffic on the condor port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the condor port.
Domain to not audit.
Send and receive UDP traffic on the condor port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the condor port.
Domain to not audit.
Bind TCP sockets to the condor port.
Domain allowed access.
Bind UDP sockets to the condor port.
Domain allowed access.
Make a TCP connection to the condor port.
Domain allowed access.
Send condor_client packets.
Domain allowed access.
Do not audit attempts to send condor_client packets.
Domain to not audit.
Receive condor_client packets.
Domain allowed access.
Do not audit attempts to receive condor_client packets.
Domain allowed access.
Send and receive condor_client packets.
Domain allowed access.
Do not audit attempts to send and receive condor_client packets.
Domain to not audit.
Relabel packets to condor_client the packet type.
Domain allowed access.
Send condor_server packets.
Domain allowed access.
Do not audit attempts to send condor_server packets.
Domain to not audit.
Receive condor_server packets.
Domain allowed access.
Do not audit attempts to receive condor_server packets.
Domain allowed access.
Send and receive condor_server packets.
Domain allowed access.
Do not audit attempts to send and receive condor_server packets.
Domain to not audit.
Relabel packets to condor_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the conman port.
Domain allowed access.
Send UDP traffic on the conman port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the conman port.
Domain to not audit.
Receive UDP traffic on the conman port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the conman port.
Domain to not audit.
Send and receive UDP traffic on the conman port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the conman port.
Domain to not audit.
Bind TCP sockets to the conman port.
Domain allowed access.
Bind UDP sockets to the conman port.
Domain allowed access.
Make a TCP connection to the conman port.
Domain allowed access.
Send conman_client packets.
Domain allowed access.
Do not audit attempts to send conman_client packets.
Domain to not audit.
Receive conman_client packets.
Domain allowed access.
Do not audit attempts to receive conman_client packets.
Domain allowed access.
Send and receive conman_client packets.
Domain allowed access.
Do not audit attempts to send and receive conman_client packets.
Domain to not audit.
Relabel packets to conman_client the packet type.
Domain allowed access.
Send conman_server packets.
Domain allowed access.
Do not audit attempts to send conman_server packets.
Domain to not audit.
Receive conman_server packets.
Domain allowed access.
Do not audit attempts to receive conman_server packets.
Domain allowed access.
Send and receive conman_server packets.
Domain allowed access.
Do not audit attempts to send and receive conman_server packets.
Domain to not audit.
Relabel packets to conman_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ctdb port.
Domain allowed access.
Send UDP traffic on the ctdb port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ctdb port.
Domain to not audit.
Receive UDP traffic on the ctdb port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ctdb port.
Domain to not audit.
Send and receive UDP traffic on the ctdb port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ctdb port.
Domain to not audit.
Bind TCP sockets to the ctdb port.
Domain allowed access.
Bind UDP sockets to the ctdb port.
Domain allowed access.
Make a TCP connection to the ctdb port.
Domain allowed access.
Send ctdb_client packets.
Domain allowed access.
Do not audit attempts to send ctdb_client packets.
Domain to not audit.
Receive ctdb_client packets.
Domain allowed access.
Do not audit attempts to receive ctdb_client packets.
Domain allowed access.
Send and receive ctdb_client packets.
Domain allowed access.
Do not audit attempts to send and receive ctdb_client packets.
Domain to not audit.
Relabel packets to ctdb_client the packet type.
Domain allowed access.
Send ctdb_server packets.
Domain allowed access.
Do not audit attempts to send ctdb_server packets.
Domain to not audit.
Receive ctdb_server packets.
Domain allowed access.
Do not audit attempts to receive ctdb_server packets.
Domain allowed access.
Send and receive ctdb_server packets.
Domain allowed access.
Do not audit attempts to send and receive ctdb_server packets.
Domain to not audit.
Relabel packets to ctdb_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cvs port.
Domain allowed access.
Send UDP traffic on the cvs port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cvs port.
Domain to not audit.
Receive UDP traffic on the cvs port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cvs port.
Domain to not audit.
Send and receive UDP traffic on the cvs port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cvs port.
Domain to not audit.
Bind TCP sockets to the cvs port.
Domain allowed access.
Bind UDP sockets to the cvs port.
Domain allowed access.
Make a TCP connection to the cvs port.
Domain allowed access.
Send cvs_client packets.
Domain allowed access.
Do not audit attempts to send cvs_client packets.
Domain to not audit.
Receive cvs_client packets.
Domain allowed access.
Do not audit attempts to receive cvs_client packets.
Domain allowed access.
Send and receive cvs_client packets.
Domain allowed access.
Do not audit attempts to send and receive cvs_client packets.
Domain to not audit.
Relabel packets to cvs_client the packet type.
Domain allowed access.
Send cvs_server packets.
Domain allowed access.
Do not audit attempts to send cvs_server packets.
Domain to not audit.
Receive cvs_server packets.
Domain allowed access.
Do not audit attempts to receive cvs_server packets.
Domain allowed access.
Send and receive cvs_server packets.
Domain allowed access.
Do not audit attempts to send and receive cvs_server packets.
Domain to not audit.
Relabel packets to cvs_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cyphesis port.
Domain allowed access.
Send UDP traffic on the cyphesis port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cyphesis port.
Domain to not audit.
Receive UDP traffic on the cyphesis port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cyphesis port.
Domain to not audit.
Send and receive UDP traffic on the cyphesis port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cyphesis port.
Domain to not audit.
Bind TCP sockets to the cyphesis port.
Domain allowed access.
Bind UDP sockets to the cyphesis port.
Domain allowed access.
Make a TCP connection to the cyphesis port.
Domain allowed access.
Send cyphesis_client packets.
Domain allowed access.
Do not audit attempts to send cyphesis_client packets.
Domain to not audit.
Receive cyphesis_client packets.
Domain allowed access.
Do not audit attempts to receive cyphesis_client packets.
Domain allowed access.
Send and receive cyphesis_client packets.
Domain allowed access.
Do not audit attempts to send and receive cyphesis_client packets.
Domain to not audit.
Relabel packets to cyphesis_client the packet type.
Domain allowed access.
Send cyphesis_server packets.
Domain allowed access.
Do not audit attempts to send cyphesis_server packets.
Domain to not audit.
Receive cyphesis_server packets.
Domain allowed access.
Do not audit attempts to receive cyphesis_server packets.
Domain allowed access.
Send and receive cyphesis_server packets.
Domain allowed access.
Do not audit attempts to send and receive cyphesis_server packets.
Domain to not audit.
Relabel packets to cyphesis_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the cyrus_imapd port.
Domain allowed access.
Send UDP traffic on the cyrus_imapd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the cyrus_imapd port.
Domain to not audit.
Receive UDP traffic on the cyrus_imapd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the cyrus_imapd port.
Domain to not audit.
Send and receive UDP traffic on the cyrus_imapd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the cyrus_imapd port.
Domain to not audit.
Bind TCP sockets to the cyrus_imapd port.
Domain allowed access.
Bind UDP sockets to the cyrus_imapd port.
Domain allowed access.
Make a TCP connection to the cyrus_imapd port.
Domain allowed access.
Send cyrus_imapd_client packets.
Domain allowed access.
Do not audit attempts to send cyrus_imapd_client packets.
Domain to not audit.
Receive cyrus_imapd_client packets.
Domain allowed access.
Do not audit attempts to receive cyrus_imapd_client packets.
Domain allowed access.
Send and receive cyrus_imapd_client packets.
Domain allowed access.
Do not audit attempts to send and receive cyrus_imapd_client packets.
Domain to not audit.
Relabel packets to cyrus_imapd_client the packet type.
Domain allowed access.
Send cyrus_imapd_server packets.
Domain allowed access.
Do not audit attempts to send cyrus_imapd_server packets.
Domain to not audit.
Receive cyrus_imapd_server packets.
Domain allowed access.
Do not audit attempts to receive cyrus_imapd_server packets.
Domain allowed access.
Send and receive cyrus_imapd_server packets.
Domain allowed access.
Do not audit attempts to send and receive cyrus_imapd_server packets.
Domain to not audit.
Relabel packets to cyrus_imapd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the connlcli port.
Domain allowed access.
Send UDP traffic on the connlcli port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the connlcli port.
Domain to not audit.
Receive UDP traffic on the connlcli port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the connlcli port.
Domain to not audit.
Send and receive UDP traffic on the connlcli port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the connlcli port.
Domain to not audit.
Bind TCP sockets to the connlcli port.
Domain allowed access.
Bind UDP sockets to the connlcli port.
Domain allowed access.
Make a TCP connection to the connlcli port.
Domain allowed access.
Send connlcli_client packets.
Domain allowed access.
Do not audit attempts to send connlcli_client packets.
Domain to not audit.
Receive connlcli_client packets.
Domain allowed access.
Do not audit attempts to receive connlcli_client packets.
Domain allowed access.
Send and receive connlcli_client packets.
Domain allowed access.
Do not audit attempts to send and receive connlcli_client packets.
Domain to not audit.
Relabel packets to connlcli_client the packet type.
Domain allowed access.
Send connlcli_server packets.
Domain allowed access.
Do not audit attempts to send connlcli_server packets.
Domain to not audit.
Receive connlcli_server packets.
Domain allowed access.
Do not audit attempts to receive connlcli_server packets.
Domain allowed access.
Send and receive connlcli_server packets.
Domain allowed access.
Do not audit attempts to send and receive connlcli_server packets.
Domain to not audit.
Relabel packets to connlcli_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the gluster port.
Domain allowed access.
Send UDP traffic on the gluster port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the gluster port.
Domain to not audit.
Receive UDP traffic on the gluster port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the gluster port.
Domain to not audit.
Send and receive UDP traffic on the gluster port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the gluster port.
Domain to not audit.
Bind TCP sockets to the gluster port.
Domain allowed access.
Bind UDP sockets to the gluster port.
Domain allowed access.
Make a TCP connection to the gluster port.
Domain allowed access.
Send gluster_client packets.
Domain allowed access.
Do not audit attempts to send gluster_client packets.
Domain to not audit.
Receive gluster_client packets.
Domain allowed access.
Do not audit attempts to receive gluster_client packets.
Domain allowed access.
Send and receive gluster_client packets.
Domain allowed access.
Do not audit attempts to send and receive gluster_client packets.
Domain to not audit.
Relabel packets to gluster_client the packet type.
Domain allowed access.
Send gluster_server packets.
Domain allowed access.
Do not audit attempts to send gluster_server packets.
Domain to not audit.
Receive gluster_server packets.
Domain allowed access.
Do not audit attempts to receive gluster_server packets.
Domain allowed access.
Send and receive gluster_server packets.
Domain allowed access.
Do not audit attempts to send and receive gluster_server packets.
Domain to not audit.
Relabel packets to gluster_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dbskkd port.
Domain allowed access.
Send UDP traffic on the dbskkd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dbskkd port.
Domain to not audit.
Receive UDP traffic on the dbskkd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dbskkd port.
Domain to not audit.
Send and receive UDP traffic on the dbskkd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dbskkd port.
Domain to not audit.
Bind TCP sockets to the dbskkd port.
Domain allowed access.
Bind UDP sockets to the dbskkd port.
Domain allowed access.
Make a TCP connection to the dbskkd port.
Domain allowed access.
Send dbskkd_client packets.
Domain allowed access.
Do not audit attempts to send dbskkd_client packets.
Domain to not audit.
Receive dbskkd_client packets.
Domain allowed access.
Do not audit attempts to receive dbskkd_client packets.
Domain allowed access.
Send and receive dbskkd_client packets.
Domain allowed access.
Do not audit attempts to send and receive dbskkd_client packets.
Domain to not audit.
Relabel packets to dbskkd_client the packet type.
Domain allowed access.
Send dbskkd_server packets.
Domain allowed access.
Do not audit attempts to send dbskkd_server packets.
Domain to not audit.
Receive dbskkd_server packets.
Domain allowed access.
Do not audit attempts to receive dbskkd_server packets.
Domain allowed access.
Send and receive dbskkd_server packets.
Domain allowed access.
Do not audit attempts to send and receive dbskkd_server packets.
Domain to not audit.
Relabel packets to dbskkd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dcc port.
Domain allowed access.
Send UDP traffic on the dcc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dcc port.
Domain to not audit.
Receive UDP traffic on the dcc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dcc port.
Domain to not audit.
Send and receive UDP traffic on the dcc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dcc port.
Domain to not audit.
Bind TCP sockets to the dcc port.
Domain allowed access.
Bind UDP sockets to the dcc port.
Domain allowed access.
Make a TCP connection to the dcc port.
Domain allowed access.
Send dcc_client packets.
Domain allowed access.
Do not audit attempts to send dcc_client packets.
Domain to not audit.
Receive dcc_client packets.
Domain allowed access.
Do not audit attempts to receive dcc_client packets.
Domain allowed access.
Send and receive dcc_client packets.
Domain allowed access.
Do not audit attempts to send and receive dcc_client packets.
Domain to not audit.
Relabel packets to dcc_client the packet type.
Domain allowed access.
Send dcc_server packets.
Domain allowed access.
Do not audit attempts to send dcc_server packets.
Domain to not audit.
Receive dcc_server packets.
Domain allowed access.
Do not audit attempts to receive dcc_server packets.
Domain allowed access.
Send and receive dcc_server packets.
Domain allowed access.
Do not audit attempts to send and receive dcc_server packets.
Domain to not audit.
Relabel packets to dcc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dccm port.
Domain allowed access.
Send UDP traffic on the dccm port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dccm port.
Domain to not audit.
Receive UDP traffic on the dccm port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dccm port.
Domain to not audit.
Send and receive UDP traffic on the dccm port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dccm port.
Domain to not audit.
Bind TCP sockets to the dccm port.
Domain allowed access.
Bind UDP sockets to the dccm port.
Domain allowed access.
Make a TCP connection to the dccm port.
Domain allowed access.
Send dccm_client packets.
Domain allowed access.
Do not audit attempts to send dccm_client packets.
Domain to not audit.
Receive dccm_client packets.
Domain allowed access.
Do not audit attempts to receive dccm_client packets.
Domain allowed access.
Send and receive dccm_client packets.
Domain allowed access.
Do not audit attempts to send and receive dccm_client packets.
Domain to not audit.
Relabel packets to dccm_client the packet type.
Domain allowed access.
Send dccm_server packets.
Domain allowed access.
Do not audit attempts to send dccm_server packets.
Domain to not audit.
Receive dccm_server packets.
Domain allowed access.
Do not audit attempts to receive dccm_server packets.
Domain allowed access.
Send and receive dccm_server packets.
Domain allowed access.
Do not audit attempts to send and receive dccm_server packets.
Domain to not audit.
Relabel packets to dccm_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dhcpc port.
Domain allowed access.
Send UDP traffic on the dhcpc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dhcpc port.
Domain to not audit.
Receive UDP traffic on the dhcpc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dhcpc port.
Domain to not audit.
Send and receive UDP traffic on the dhcpc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dhcpc port.
Domain to not audit.
Bind TCP sockets to the dhcpc port.
Domain allowed access.
Bind UDP sockets to the dhcpc port.
Domain allowed access.
Make a TCP connection to the dhcpc port.
Domain allowed access.
Send dhcpc_client packets.
Domain allowed access.
Do not audit attempts to send dhcpc_client packets.
Domain to not audit.
Receive dhcpc_client packets.
Domain allowed access.
Do not audit attempts to receive dhcpc_client packets.
Domain allowed access.
Send and receive dhcpc_client packets.
Domain allowed access.
Do not audit attempts to send and receive dhcpc_client packets.
Domain to not audit.
Relabel packets to dhcpc_client the packet type.
Domain allowed access.
Send dhcpc_server packets.
Domain allowed access.
Do not audit attempts to send dhcpc_server packets.
Domain to not audit.
Receive dhcpc_server packets.
Domain allowed access.
Do not audit attempts to receive dhcpc_server packets.
Domain allowed access.
Send and receive dhcpc_server packets.
Domain allowed access.
Do not audit attempts to send and receive dhcpc_server packets.
Domain to not audit.
Relabel packets to dhcpc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dhcpd port.
Domain allowed access.
Send UDP traffic on the dhcpd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dhcpd port.
Domain to not audit.
Receive UDP traffic on the dhcpd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dhcpd port.
Domain to not audit.
Send and receive UDP traffic on the dhcpd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dhcpd port.
Domain to not audit.
Bind TCP sockets to the dhcpd port.
Domain allowed access.
Bind UDP sockets to the dhcpd port.
Domain allowed access.
Make a TCP connection to the dhcpd port.
Domain allowed access.
Send dhcpd_client packets.
Domain allowed access.
Do not audit attempts to send dhcpd_client packets.
Domain to not audit.
Receive dhcpd_client packets.
Domain allowed access.
Do not audit attempts to receive dhcpd_client packets.
Domain allowed access.
Send and receive dhcpd_client packets.
Domain allowed access.
Do not audit attempts to send and receive dhcpd_client packets.
Domain to not audit.
Relabel packets to dhcpd_client the packet type.
Domain allowed access.
Send dhcpd_server packets.
Domain allowed access.
Do not audit attempts to send dhcpd_server packets.
Domain to not audit.
Receive dhcpd_server packets.
Domain allowed access.
Do not audit attempts to receive dhcpd_server packets.
Domain allowed access.
Send and receive dhcpd_server packets.
Domain allowed access.
Do not audit attempts to send and receive dhcpd_server packets.
Domain to not audit.
Relabel packets to dhcpd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dey_sapi port.
Domain allowed access.
Send UDP traffic on the dey_sapi port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dey_sapi port.
Domain to not audit.
Receive UDP traffic on the dey_sapi port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dey_sapi port.
Domain to not audit.
Send and receive UDP traffic on the dey_sapi port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dey_sapi port.
Domain to not audit.
Bind TCP sockets to the dey_sapi port.
Domain allowed access.
Bind UDP sockets to the dey_sapi port.
Domain allowed access.
Make a TCP connection to the dey_sapi port.
Domain allowed access.
Send dey_sapi_client packets.
Domain allowed access.
Do not audit attempts to send dey_sapi_client packets.
Domain to not audit.
Receive dey_sapi_client packets.
Domain allowed access.
Do not audit attempts to receive dey_sapi_client packets.
Domain allowed access.
Send and receive dey_sapi_client packets.
Domain allowed access.
Do not audit attempts to send and receive dey_sapi_client packets.
Domain to not audit.
Relabel packets to dey_sapi_client the packet type.
Domain allowed access.
Send dey_sapi_server packets.
Domain allowed access.
Do not audit attempts to send dey_sapi_server packets.
Domain to not audit.
Receive dey_sapi_server packets.
Domain allowed access.
Do not audit attempts to receive dey_sapi_server packets.
Domain allowed access.
Send and receive dey_sapi_server packets.
Domain allowed access.
Do not audit attempts to send and receive dey_sapi_server packets.
Domain to not audit.
Relabel packets to dey_sapi_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dict port.
Domain allowed access.
Send UDP traffic on the dict port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dict port.
Domain to not audit.
Receive UDP traffic on the dict port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dict port.
Domain to not audit.
Send and receive UDP traffic on the dict port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dict port.
Domain to not audit.
Bind TCP sockets to the dict port.
Domain allowed access.
Bind UDP sockets to the dict port.
Domain allowed access.
Make a TCP connection to the dict port.
Domain allowed access.
Send dict_client packets.
Domain allowed access.
Do not audit attempts to send dict_client packets.
Domain to not audit.
Receive dict_client packets.
Domain allowed access.
Do not audit attempts to receive dict_client packets.
Domain allowed access.
Send and receive dict_client packets.
Domain allowed access.
Do not audit attempts to send and receive dict_client packets.
Domain to not audit.
Relabel packets to dict_client the packet type.
Domain allowed access.
Send dict_server packets.
Domain allowed access.
Do not audit attempts to send dict_server packets.
Domain to not audit.
Receive dict_server packets.
Domain allowed access.
Do not audit attempts to receive dict_server packets.
Domain allowed access.
Send and receive dict_server packets.
Domain allowed access.
Do not audit attempts to send and receive dict_server packets.
Domain to not audit.
Relabel packets to dict_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the distccd port.
Domain allowed access.
Send UDP traffic on the distccd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the distccd port.
Domain to not audit.
Receive UDP traffic on the distccd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the distccd port.
Domain to not audit.
Send and receive UDP traffic on the distccd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the distccd port.
Domain to not audit.
Bind TCP sockets to the distccd port.
Domain allowed access.
Bind UDP sockets to the distccd port.
Domain allowed access.
Make a TCP connection to the distccd port.
Domain allowed access.
Send distccd_client packets.
Domain allowed access.
Do not audit attempts to send distccd_client packets.
Domain to not audit.
Receive distccd_client packets.
Domain allowed access.
Do not audit attempts to receive distccd_client packets.
Domain allowed access.
Send and receive distccd_client packets.
Domain allowed access.
Do not audit attempts to send and receive distccd_client packets.
Domain to not audit.
Relabel packets to distccd_client the packet type.
Domain allowed access.
Send distccd_server packets.
Domain allowed access.
Do not audit attempts to send distccd_server packets.
Domain to not audit.
Receive distccd_server packets.
Domain allowed access.
Do not audit attempts to receive distccd_server packets.
Domain allowed access.
Send and receive distccd_server packets.
Domain allowed access.
Do not audit attempts to send and receive distccd_server packets.
Domain to not audit.
Relabel packets to distccd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dns port.
Domain allowed access.
Send UDP traffic on the dns port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dns port.
Domain to not audit.
Receive UDP traffic on the dns port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dns port.
Domain to not audit.
Send and receive UDP traffic on the dns port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dns port.
Domain to not audit.
Bind TCP sockets to the dns port.
Domain allowed access.
Bind UDP sockets to the dns port.
Domain allowed access.
Make a TCP connection to the dns port.
Domain allowed access.
Send dns_client packets.
Domain allowed access.
Do not audit attempts to send dns_client packets.
Domain to not audit.
Receive dns_client packets.
Domain allowed access.
Do not audit attempts to receive dns_client packets.
Domain allowed access.
Send and receive dns_client packets.
Domain allowed access.
Do not audit attempts to send and receive dns_client packets.
Domain to not audit.
Relabel packets to dns_client the packet type.
Domain allowed access.
Send dns_server packets.
Domain allowed access.
Do not audit attempts to send dns_server packets.
Domain to not audit.
Receive dns_server packets.
Domain allowed access.
Do not audit attempts to receive dns_server packets.
Domain allowed access.
Send and receive dns_server packets.
Domain allowed access.
Do not audit attempts to send and receive dns_server packets.
Domain to not audit.
Relabel packets to dns_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dogtag port.
Domain allowed access.
Send UDP traffic on the dogtag port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dogtag port.
Domain to not audit.
Receive UDP traffic on the dogtag port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dogtag port.
Domain to not audit.
Send and receive UDP traffic on the dogtag port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dogtag port.
Domain to not audit.
Bind TCP sockets to the dogtag port.
Domain allowed access.
Bind UDP sockets to the dogtag port.
Domain allowed access.
Make a TCP connection to the dogtag port.
Domain allowed access.
Send dogtag_client packets.
Domain allowed access.
Do not audit attempts to send dogtag_client packets.
Domain to not audit.
Receive dogtag_client packets.
Domain allowed access.
Do not audit attempts to receive dogtag_client packets.
Domain allowed access.
Send and receive dogtag_client packets.
Domain allowed access.
Do not audit attempts to send and receive dogtag_client packets.
Domain to not audit.
Relabel packets to dogtag_client the packet type.
Domain allowed access.
Send dogtag_server packets.
Domain allowed access.
Do not audit attempts to send dogtag_server packets.
Domain to not audit.
Receive dogtag_server packets.
Domain allowed access.
Do not audit attempts to receive dogtag_server packets.
Domain allowed access.
Send and receive dogtag_server packets.
Domain allowed access.
Do not audit attempts to send and receive dogtag_server packets.
Domain to not audit.
Relabel packets to dogtag_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the dspam port.
Domain allowed access.
Send UDP traffic on the dspam port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the dspam port.
Domain to not audit.
Receive UDP traffic on the dspam port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the dspam port.
Domain to not audit.
Send and receive UDP traffic on the dspam port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the dspam port.
Domain to not audit.
Bind TCP sockets to the dspam port.
Domain allowed access.
Bind UDP sockets to the dspam port.
Domain allowed access.
Make a TCP connection to the dspam port.
Domain allowed access.
Send dspam_client packets.
Domain allowed access.
Do not audit attempts to send dspam_client packets.
Domain to not audit.
Receive dspam_client packets.
Domain allowed access.
Do not audit attempts to receive dspam_client packets.
Domain allowed access.
Send and receive dspam_client packets.
Domain allowed access.
Do not audit attempts to send and receive dspam_client packets.
Domain to not audit.
Relabel packets to dspam_client the packet type.
Domain allowed access.
Send dspam_server packets.
Domain allowed access.
Do not audit attempts to send dspam_server packets.
Domain to not audit.
Receive dspam_server packets.
Domain allowed access.
Do not audit attempts to receive dspam_server packets.
Domain allowed access.
Send and receive dspam_server packets.
Domain allowed access.
Do not audit attempts to send and receive dspam_server packets.
Domain to not audit.
Relabel packets to dspam_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the epmap port.
Domain allowed access.
Send UDP traffic on the epmap port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the epmap port.
Domain to not audit.
Receive UDP traffic on the epmap port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the epmap port.
Domain to not audit.
Send and receive UDP traffic on the epmap port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the epmap port.
Domain to not audit.
Bind TCP sockets to the epmap port.
Domain allowed access.
Bind UDP sockets to the epmap port.
Domain allowed access.
Make a TCP connection to the epmap port.
Domain allowed access.
Send epmap_client packets.
Domain allowed access.
Do not audit attempts to send epmap_client packets.
Domain to not audit.
Receive epmap_client packets.
Domain allowed access.
Do not audit attempts to receive epmap_client packets.
Domain allowed access.
Send and receive epmap_client packets.
Domain allowed access.
Do not audit attempts to send and receive epmap_client packets.
Domain to not audit.
Relabel packets to epmap_client the packet type.
Domain allowed access.
Send epmap_server packets.
Domain allowed access.
Do not audit attempts to send epmap_server packets.
Domain to not audit.
Receive epmap_server packets.
Domain allowed access.
Do not audit attempts to receive epmap_server packets.
Domain allowed access.
Send and receive epmap_server packets.
Domain allowed access.
Do not audit attempts to send and receive epmap_server packets.
Domain to not audit.
Relabel packets to epmap_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the festival port.
Domain allowed access.
Send UDP traffic on the festival port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the festival port.
Domain to not audit.
Receive UDP traffic on the festival port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the festival port.
Domain to not audit.
Send and receive UDP traffic on the festival port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the festival port.
Domain to not audit.
Bind TCP sockets to the festival port.
Domain allowed access.
Bind UDP sockets to the festival port.
Domain allowed access.
Make a TCP connection to the festival port.
Domain allowed access.
Send festival_client packets.
Domain allowed access.
Do not audit attempts to send festival_client packets.
Domain to not audit.
Receive festival_client packets.
Domain allowed access.
Do not audit attempts to receive festival_client packets.
Domain allowed access.
Send and receive festival_client packets.
Domain allowed access.
Do not audit attempts to send and receive festival_client packets.
Domain to not audit.
Relabel packets to festival_client the packet type.
Domain allowed access.
Send festival_server packets.
Domain allowed access.
Do not audit attempts to send festival_server packets.
Domain to not audit.
Receive festival_server packets.
Domain allowed access.
Do not audit attempts to receive festival_server packets.
Domain allowed access.
Send and receive festival_server packets.
Domain allowed access.
Do not audit attempts to send and receive festival_server packets.
Domain to not audit.
Relabel packets to festival_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the fingerd port.
Domain allowed access.
Send UDP traffic on the fingerd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the fingerd port.
Domain to not audit.
Receive UDP traffic on the fingerd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the fingerd port.
Domain to not audit.
Send and receive UDP traffic on the fingerd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the fingerd port.
Domain to not audit.
Bind TCP sockets to the fingerd port.
Domain allowed access.
Bind UDP sockets to the fingerd port.
Domain allowed access.
Make a TCP connection to the fingerd port.
Domain allowed access.
Send fingerd_client packets.
Domain allowed access.
Do not audit attempts to send fingerd_client packets.
Domain to not audit.
Receive fingerd_client packets.
Domain allowed access.
Do not audit attempts to receive fingerd_client packets.
Domain allowed access.
Send and receive fingerd_client packets.
Domain allowed access.
Do not audit attempts to send and receive fingerd_client packets.
Domain to not audit.
Relabel packets to fingerd_client the packet type.
Domain allowed access.
Send fingerd_server packets.
Domain allowed access.
Do not audit attempts to send fingerd_server packets.
Domain to not audit.
Receive fingerd_server packets.
Domain allowed access.
Do not audit attempts to receive fingerd_server packets.
Domain allowed access.
Send and receive fingerd_server packets.
Domain allowed access.
Do not audit attempts to send and receive fingerd_server packets.
Domain to not audit.
Relabel packets to fingerd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the flash port.
Domain allowed access.
Send UDP traffic on the flash port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the flash port.
Domain to not audit.
Receive UDP traffic on the flash port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the flash port.
Domain to not audit.
Send and receive UDP traffic on the flash port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the flash port.
Domain to not audit.
Bind TCP sockets to the flash port.
Domain allowed access.
Bind UDP sockets to the flash port.
Domain allowed access.
Make a TCP connection to the flash port.
Domain allowed access.
Send flash_client packets.
Domain allowed access.
Do not audit attempts to send flash_client packets.
Domain to not audit.
Receive flash_client packets.
Domain allowed access.
Do not audit attempts to receive flash_client packets.
Domain allowed access.
Send and receive flash_client packets.
Domain allowed access.
Do not audit attempts to send and receive flash_client packets.
Domain to not audit.
Relabel packets to flash_client the packet type.
Domain allowed access.
Send flash_server packets.
Domain allowed access.
Do not audit attempts to send flash_server packets.
Domain to not audit.
Receive flash_server packets.
Domain allowed access.
Do not audit attempts to receive flash_server packets.
Domain allowed access.
Send and receive flash_server packets.
Domain allowed access.
Do not audit attempts to send and receive flash_server packets.
Domain to not audit.
Relabel packets to flash_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the florence port.
Domain allowed access.
Send UDP traffic on the florence port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the florence port.
Domain to not audit.
Receive UDP traffic on the florence port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the florence port.
Domain to not audit.
Send and receive UDP traffic on the florence port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the florence port.
Domain to not audit.
Bind TCP sockets to the florence port.
Domain allowed access.
Bind UDP sockets to the florence port.
Domain allowed access.
Make a TCP connection to the florence port.
Domain allowed access.
Send florence_client packets.
Domain allowed access.
Do not audit attempts to send florence_client packets.
Domain to not audit.
Receive florence_client packets.
Domain allowed access.
Do not audit attempts to receive florence_client packets.
Domain allowed access.
Send and receive florence_client packets.
Domain allowed access.
Do not audit attempts to send and receive florence_client packets.
Domain to not audit.
Relabel packets to florence_client the packet type.
Domain allowed access.
Send florence_server packets.
Domain allowed access.
Do not audit attempts to send florence_server packets.
Domain to not audit.
Receive florence_server packets.
Domain allowed access.
Do not audit attempts to receive florence_server packets.
Domain allowed access.
Send and receive florence_server packets.
Domain allowed access.
Do not audit attempts to send and receive florence_server packets.
Domain to not audit.
Relabel packets to florence_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the freeipmi port.
Domain allowed access.
Send UDP traffic on the freeipmi port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the freeipmi port.
Domain to not audit.
Receive UDP traffic on the freeipmi port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the freeipmi port.
Domain to not audit.
Send and receive UDP traffic on the freeipmi port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the freeipmi port.
Domain to not audit.
Bind TCP sockets to the freeipmi port.
Domain allowed access.
Bind UDP sockets to the freeipmi port.
Domain allowed access.
Make a TCP connection to the freeipmi port.
Domain allowed access.
Send freeipmi_client packets.
Domain allowed access.
Do not audit attempts to send freeipmi_client packets.
Domain to not audit.
Receive freeipmi_client packets.
Domain allowed access.
Do not audit attempts to receive freeipmi_client packets.
Domain allowed access.
Send and receive freeipmi_client packets.
Domain allowed access.
Do not audit attempts to send and receive freeipmi_client packets.
Domain to not audit.
Relabel packets to freeipmi_client the packet type.
Domain allowed access.
Send freeipmi_server packets.
Domain allowed access.
Do not audit attempts to send freeipmi_server packets.
Domain to not audit.
Receive freeipmi_server packets.
Domain allowed access.
Do not audit attempts to receive freeipmi_server packets.
Domain allowed access.
Send and receive freeipmi_server packets.
Domain allowed access.
Do not audit attempts to send and receive freeipmi_server packets.
Domain to not audit.
Relabel packets to freeipmi_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ftp port.
Domain allowed access.
Send UDP traffic on the ftp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ftp port.
Domain to not audit.
Receive UDP traffic on the ftp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ftp port.
Domain to not audit.
Send and receive UDP traffic on the ftp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ftp port.
Domain to not audit.
Bind TCP sockets to the ftp port.
Domain allowed access.
Bind UDP sockets to the ftp port.
Domain allowed access.
Make a TCP connection to the ftp port.
Domain allowed access.
Send ftp_client packets.
Domain allowed access.
Do not audit attempts to send ftp_client packets.
Domain to not audit.
Receive ftp_client packets.
Domain allowed access.
Do not audit attempts to receive ftp_client packets.
Domain allowed access.
Send and receive ftp_client packets.
Domain allowed access.
Do not audit attempts to send and receive ftp_client packets.
Domain to not audit.
Relabel packets to ftp_client the packet type.
Domain allowed access.
Send ftp_server packets.
Domain allowed access.
Do not audit attempts to send ftp_server packets.
Domain to not audit.
Receive ftp_server packets.
Domain allowed access.
Do not audit attempts to receive ftp_server packets.
Domain allowed access.
Send and receive ftp_server packets.
Domain allowed access.
Do not audit attempts to send and receive ftp_server packets.
Domain to not audit.
Relabel packets to ftp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ftp_data port.
Domain allowed access.
Send UDP traffic on the ftp_data port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ftp_data port.
Domain to not audit.
Receive UDP traffic on the ftp_data port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ftp_data port.
Domain to not audit.
Send and receive UDP traffic on the ftp_data port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ftp_data port.
Domain to not audit.
Bind TCP sockets to the ftp_data port.
Domain allowed access.
Bind UDP sockets to the ftp_data port.
Domain allowed access.
Make a TCP connection to the ftp_data port.
Domain allowed access.
Send ftp_data_client packets.
Domain allowed access.
Do not audit attempts to send ftp_data_client packets.
Domain to not audit.
Receive ftp_data_client packets.
Domain allowed access.
Do not audit attempts to receive ftp_data_client packets.
Domain allowed access.
Send and receive ftp_data_client packets.
Domain allowed access.
Do not audit attempts to send and receive ftp_data_client packets.
Domain to not audit.
Relabel packets to ftp_data_client the packet type.
Domain allowed access.
Send ftp_data_server packets.
Domain allowed access.
Do not audit attempts to send ftp_data_server packets.
Domain to not audit.
Receive ftp_data_server packets.
Domain allowed access.
Do not audit attempts to receive ftp_data_server packets.
Domain allowed access.
Send and receive ftp_data_server packets.
Domain allowed access.
Do not audit attempts to send and receive ftp_data_server packets.
Domain to not audit.
Relabel packets to ftp_data_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the gatekeeper port.
Domain allowed access.
Send UDP traffic on the gatekeeper port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the gatekeeper port.
Domain to not audit.
Receive UDP traffic on the gatekeeper port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the gatekeeper port.
Domain to not audit.
Send and receive UDP traffic on the gatekeeper port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the gatekeeper port.
Domain to not audit.
Bind TCP sockets to the gatekeeper port.
Domain allowed access.
Bind UDP sockets to the gatekeeper port.
Domain allowed access.
Make a TCP connection to the gatekeeper port.
Domain allowed access.
Send gatekeeper_client packets.
Domain allowed access.
Do not audit attempts to send gatekeeper_client packets.
Domain to not audit.
Receive gatekeeper_client packets.
Domain allowed access.
Do not audit attempts to receive gatekeeper_client packets.
Domain allowed access.
Send and receive gatekeeper_client packets.
Domain allowed access.
Do not audit attempts to send and receive gatekeeper_client packets.
Domain to not audit.
Relabel packets to gatekeeper_client the packet type.
Domain allowed access.
Send gatekeeper_server packets.
Domain allowed access.
Do not audit attempts to send gatekeeper_server packets.
Domain to not audit.
Receive gatekeeper_server packets.
Domain allowed access.
Do not audit attempts to receive gatekeeper_server packets.
Domain allowed access.
Send and receive gatekeeper_server packets.
Domain allowed access.
Do not audit attempts to send and receive gatekeeper_server packets.
Domain to not audit.
Relabel packets to gatekeeper_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the giftd port.
Domain allowed access.
Send UDP traffic on the giftd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the giftd port.
Domain to not audit.
Receive UDP traffic on the giftd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the giftd port.
Domain to not audit.
Send and receive UDP traffic on the giftd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the giftd port.
Domain to not audit.
Bind TCP sockets to the giftd port.
Domain allowed access.
Bind UDP sockets to the giftd port.
Domain allowed access.
Make a TCP connection to the giftd port.
Domain allowed access.
Send giftd_client packets.
Domain allowed access.
Do not audit attempts to send giftd_client packets.
Domain to not audit.
Receive giftd_client packets.
Domain allowed access.
Do not audit attempts to receive giftd_client packets.
Domain allowed access.
Send and receive giftd_client packets.
Domain allowed access.
Do not audit attempts to send and receive giftd_client packets.
Domain to not audit.
Relabel packets to giftd_client the packet type.
Domain allowed access.
Send giftd_server packets.
Domain allowed access.
Do not audit attempts to send giftd_server packets.
Domain to not audit.
Receive giftd_server packets.
Domain allowed access.
Do not audit attempts to receive giftd_server packets.
Domain allowed access.
Send and receive giftd_server packets.
Domain allowed access.
Do not audit attempts to send and receive giftd_server packets.
Domain to not audit.
Relabel packets to giftd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the git port.
Domain allowed access.
Send UDP traffic on the git port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the git port.
Domain to not audit.
Receive UDP traffic on the git port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the git port.
Domain to not audit.
Send and receive UDP traffic on the git port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the git port.
Domain to not audit.
Bind TCP sockets to the git port.
Domain allowed access.
Bind UDP sockets to the git port.
Domain allowed access.
Make a TCP connection to the git port.
Domain allowed access.
Send git_client packets.
Domain allowed access.
Do not audit attempts to send git_client packets.
Domain to not audit.
Receive git_client packets.
Domain allowed access.
Do not audit attempts to receive git_client packets.
Domain allowed access.
Send and receive git_client packets.
Domain allowed access.
Do not audit attempts to send and receive git_client packets.
Domain to not audit.
Relabel packets to git_client the packet type.
Domain allowed access.
Send git_server packets.
Domain allowed access.
Do not audit attempts to send git_server packets.
Domain to not audit.
Receive git_server packets.
Domain allowed access.
Do not audit attempts to receive git_server packets.
Domain allowed access.
Send and receive git_server packets.
Domain allowed access.
Do not audit attempts to send and receive git_server packets.
Domain to not audit.
Relabel packets to git_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the glance port.
Domain allowed access.
Send UDP traffic on the glance port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the glance port.
Domain to not audit.
Receive UDP traffic on the glance port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the glance port.
Domain to not audit.
Send and receive UDP traffic on the glance port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the glance port.
Domain to not audit.
Bind TCP sockets to the glance port.
Domain allowed access.
Bind UDP sockets to the glance port.
Domain allowed access.
Make a TCP connection to the glance port.
Domain allowed access.
Send glance_client packets.
Domain allowed access.
Do not audit attempts to send glance_client packets.
Domain to not audit.
Receive glance_client packets.
Domain allowed access.
Do not audit attempts to receive glance_client packets.
Domain allowed access.
Send and receive glance_client packets.
Domain allowed access.
Do not audit attempts to send and receive glance_client packets.
Domain to not audit.
Relabel packets to glance_client the packet type.
Domain allowed access.
Send glance_server packets.
Domain allowed access.
Do not audit attempts to send glance_server packets.
Domain to not audit.
Receive glance_server packets.
Domain allowed access.
Do not audit attempts to receive glance_server packets.
Domain allowed access.
Send and receive glance_server packets.
Domain allowed access.
Do not audit attempts to send and receive glance_server packets.
Domain to not audit.
Relabel packets to glance_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the glance_registry port.
Domain allowed access.
Send UDP traffic on the glance_registry port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the glance_registry port.
Domain to not audit.
Receive UDP traffic on the glance_registry port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the glance_registry port.
Domain to not audit.
Send and receive UDP traffic on the glance_registry port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the glance_registry port.
Domain to not audit.
Bind TCP sockets to the glance_registry port.
Domain allowed access.
Bind UDP sockets to the glance_registry port.
Domain allowed access.
Make a TCP connection to the glance_registry port.
Domain allowed access.
Send glance_registry_client packets.
Domain allowed access.
Do not audit attempts to send glance_registry_client packets.
Domain to not audit.
Receive glance_registry_client packets.
Domain allowed access.
Do not audit attempts to receive glance_registry_client packets.
Domain allowed access.
Send and receive glance_registry_client packets.
Domain allowed access.
Do not audit attempts to send and receive glance_registry_client packets.
Domain to not audit.
Relabel packets to glance_registry_client the packet type.
Domain allowed access.
Send glance_registry_server packets.
Domain allowed access.
Do not audit attempts to send glance_registry_server packets.
Domain to not audit.
Receive glance_registry_server packets.
Domain allowed access.
Do not audit attempts to receive glance_registry_server packets.
Domain allowed access.
Send and receive glance_registry_server packets.
Domain allowed access.
Do not audit attempts to send and receive glance_registry_server packets.
Domain to not audit.
Relabel packets to glance_registry_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the gopher port.
Domain allowed access.
Send UDP traffic on the gopher port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the gopher port.
Domain to not audit.
Receive UDP traffic on the gopher port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the gopher port.
Domain to not audit.
Send and receive UDP traffic on the gopher port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the gopher port.
Domain to not audit.
Bind TCP sockets to the gopher port.
Domain allowed access.
Bind UDP sockets to the gopher port.
Domain allowed access.
Make a TCP connection to the gopher port.
Domain allowed access.
Send gopher_client packets.
Domain allowed access.
Do not audit attempts to send gopher_client packets.
Domain to not audit.
Receive gopher_client packets.
Domain allowed access.
Do not audit attempts to receive gopher_client packets.
Domain allowed access.
Send and receive gopher_client packets.
Domain allowed access.
Do not audit attempts to send and receive gopher_client packets.
Domain to not audit.
Relabel packets to gopher_client the packet type.
Domain allowed access.
Send gopher_server packets.
Domain allowed access.
Do not audit attempts to send gopher_server packets.
Domain to not audit.
Receive gopher_server packets.
Domain allowed access.
Do not audit attempts to receive gopher_server packets.
Domain allowed access.
Send and receive gopher_server packets.
Domain allowed access.
Do not audit attempts to send and receive gopher_server packets.
Domain to not audit.
Relabel packets to gopher_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the gpsd port.
Domain allowed access.
Send UDP traffic on the gpsd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the gpsd port.
Domain to not audit.
Receive UDP traffic on the gpsd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the gpsd port.
Domain to not audit.
Send and receive UDP traffic on the gpsd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the gpsd port.
Domain to not audit.
Bind TCP sockets to the gpsd port.
Domain allowed access.
Bind UDP sockets to the gpsd port.
Domain allowed access.
Make a TCP connection to the gpsd port.
Domain allowed access.
Send gpsd_client packets.
Domain allowed access.
Do not audit attempts to send gpsd_client packets.
Domain to not audit.
Receive gpsd_client packets.
Domain allowed access.
Do not audit attempts to receive gpsd_client packets.
Domain allowed access.
Send and receive gpsd_client packets.
Domain allowed access.
Do not audit attempts to send and receive gpsd_client packets.
Domain to not audit.
Relabel packets to gpsd_client the packet type.
Domain allowed access.
Send gpsd_server packets.
Domain allowed access.
Do not audit attempts to send gpsd_server packets.
Domain to not audit.
Receive gpsd_server packets.
Domain allowed access.
Do not audit attempts to receive gpsd_server packets.
Domain allowed access.
Send and receive gpsd_server packets.
Domain allowed access.
Do not audit attempts to send and receive gpsd_server packets.
Domain to not audit.
Relabel packets to gpsd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the hddtemp port.
Domain allowed access.
Send UDP traffic on the hddtemp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the hddtemp port.
Domain to not audit.
Receive UDP traffic on the hddtemp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the hddtemp port.
Domain to not audit.
Send and receive UDP traffic on the hddtemp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the hddtemp port.
Domain to not audit.
Bind TCP sockets to the hddtemp port.
Domain allowed access.
Bind UDP sockets to the hddtemp port.
Domain allowed access.
Make a TCP connection to the hddtemp port.
Domain allowed access.
Send hddtemp_client packets.
Domain allowed access.
Do not audit attempts to send hddtemp_client packets.
Domain to not audit.
Receive hddtemp_client packets.
Domain allowed access.
Do not audit attempts to receive hddtemp_client packets.
Domain allowed access.
Send and receive hddtemp_client packets.
Domain allowed access.
Do not audit attempts to send and receive hddtemp_client packets.
Domain to not audit.
Relabel packets to hddtemp_client the packet type.
Domain allowed access.
Send hddtemp_server packets.
Domain allowed access.
Do not audit attempts to send hddtemp_server packets.
Domain to not audit.
Receive hddtemp_server packets.
Domain allowed access.
Do not audit attempts to receive hddtemp_server packets.
Domain allowed access.
Send and receive hddtemp_server packets.
Domain allowed access.
Do not audit attempts to send and receive hddtemp_server packets.
Domain to not audit.
Relabel packets to hddtemp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the howl port.
Domain allowed access.
Send UDP traffic on the howl port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the howl port.
Domain to not audit.
Receive UDP traffic on the howl port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the howl port.
Domain to not audit.
Send and receive UDP traffic on the howl port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the howl port.
Domain to not audit.
Bind TCP sockets to the howl port.
Domain allowed access.
Bind UDP sockets to the howl port.
Domain allowed access.
Make a TCP connection to the howl port.
Domain allowed access.
Send howl_client packets.
Domain allowed access.
Do not audit attempts to send howl_client packets.
Domain to not audit.
Receive howl_client packets.
Domain allowed access.
Do not audit attempts to receive howl_client packets.
Domain allowed access.
Send and receive howl_client packets.
Domain allowed access.
Do not audit attempts to send and receive howl_client packets.
Domain to not audit.
Relabel packets to howl_client the packet type.
Domain allowed access.
Send howl_server packets.
Domain allowed access.
Do not audit attempts to send howl_server packets.
Domain to not audit.
Receive howl_server packets.
Domain allowed access.
Do not audit attempts to receive howl_server packets.
Domain allowed access.
Send and receive howl_server packets.
Domain allowed access.
Do not audit attempts to send and receive howl_server packets.
Domain to not audit.
Relabel packets to howl_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the hplip port.
Domain allowed access.
Send UDP traffic on the hplip port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the hplip port.
Domain to not audit.
Receive UDP traffic on the hplip port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the hplip port.
Domain to not audit.
Send and receive UDP traffic on the hplip port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the hplip port.
Domain to not audit.
Bind TCP sockets to the hplip port.
Domain allowed access.
Bind UDP sockets to the hplip port.
Domain allowed access.
Make a TCP connection to the hplip port.
Domain allowed access.
Send hplip_client packets.
Domain allowed access.
Do not audit attempts to send hplip_client packets.
Domain to not audit.
Receive hplip_client packets.
Domain allowed access.
Do not audit attempts to receive hplip_client packets.
Domain allowed access.
Send and receive hplip_client packets.
Domain allowed access.
Do not audit attempts to send and receive hplip_client packets.
Domain to not audit.
Relabel packets to hplip_client the packet type.
Domain allowed access.
Send hplip_server packets.
Domain allowed access.
Do not audit attempts to send hplip_server packets.
Domain to not audit.
Receive hplip_server packets.
Domain allowed access.
Do not audit attempts to receive hplip_server packets.
Domain allowed access.
Send and receive hplip_server packets.
Domain allowed access.
Do not audit attempts to send and receive hplip_server packets.
Domain to not audit.
Relabel packets to hplip_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the http port.
Domain allowed access.
Send UDP traffic on the http port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the http port.
Domain to not audit.
Receive UDP traffic on the http port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the http port.
Domain to not audit.
Send and receive UDP traffic on the http port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the http port.
Domain to not audit.
Bind TCP sockets to the http port.
Domain allowed access.
Bind UDP sockets to the http port.
Domain allowed access.
Make a TCP connection to the http port.
Domain allowed access.
Send http_client packets.
Domain allowed access.
Do not audit attempts to send http_client packets.
Domain to not audit.
Receive http_client packets.
Domain allowed access.
Do not audit attempts to receive http_client packets.
Domain allowed access.
Send and receive http_client packets.
Domain allowed access.
Do not audit attempts to send and receive http_client packets.
Domain to not audit.
Relabel packets to http_client the packet type.
Domain allowed access.
Send http_server packets.
Domain allowed access.
Do not audit attempts to send http_server packets.
Domain to not audit.
Receive http_server packets.
Domain allowed access.
Do not audit attempts to receive http_server packets.
Domain allowed access.
Send and receive http_server packets.
Domain allowed access.
Do not audit attempts to send and receive http_server packets.
Domain to not audit.
Relabel packets to http_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the http_cache port.
Domain allowed access.
Send UDP traffic on the http_cache port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the http_cache port.
Domain to not audit.
Receive UDP traffic on the http_cache port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the http_cache port.
Domain to not audit.
Send and receive UDP traffic on the http_cache port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the http_cache port.
Domain to not audit.
Bind TCP sockets to the http_cache port.
Domain allowed access.
Bind UDP sockets to the http_cache port.
Domain allowed access.
Make a TCP connection to the http_cache port.
Domain allowed access.
Send http_cache_client packets.
Domain allowed access.
Do not audit attempts to send http_cache_client packets.
Domain to not audit.
Receive http_cache_client packets.
Domain allowed access.
Do not audit attempts to receive http_cache_client packets.
Domain allowed access.
Send and receive http_cache_client packets.
Domain allowed access.
Do not audit attempts to send and receive http_cache_client packets.
Domain to not audit.
Relabel packets to http_cache_client the packet type.
Domain allowed access.
Send http_cache_server packets.
Domain allowed access.
Do not audit attempts to send http_cache_server packets.
Domain to not audit.
Receive http_cache_server packets.
Domain allowed access.
Do not audit attempts to receive http_cache_server packets.
Domain allowed access.
Send and receive http_cache_server packets.
Domain allowed access.
Do not audit attempts to send and receive http_cache_server packets.
Domain to not audit.
Relabel packets to http_cache_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the i18n_input port.
Domain allowed access.
Send UDP traffic on the i18n_input port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the i18n_input port.
Domain to not audit.
Receive UDP traffic on the i18n_input port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the i18n_input port.
Domain to not audit.
Send and receive UDP traffic on the i18n_input port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the i18n_input port.
Domain to not audit.
Bind TCP sockets to the i18n_input port.
Domain allowed access.
Bind UDP sockets to the i18n_input port.
Domain allowed access.
Make a TCP connection to the i18n_input port.
Domain allowed access.
Send i18n_input_client packets.
Domain allowed access.
Do not audit attempts to send i18n_input_client packets.
Domain to not audit.
Receive i18n_input_client packets.
Domain allowed access.
Do not audit attempts to receive i18n_input_client packets.
Domain allowed access.
Send and receive i18n_input_client packets.
Domain allowed access.
Do not audit attempts to send and receive i18n_input_client packets.
Domain to not audit.
Relabel packets to i18n_input_client the packet type.
Domain allowed access.
Send i18n_input_server packets.
Domain allowed access.
Do not audit attempts to send i18n_input_server packets.
Domain to not audit.
Receive i18n_input_server packets.
Domain allowed access.
Do not audit attempts to receive i18n_input_server packets.
Domain allowed access.
Send and receive i18n_input_server packets.
Domain allowed access.
Do not audit attempts to send and receive i18n_input_server packets.
Domain to not audit.
Relabel packets to i18n_input_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the imaze port.
Domain allowed access.
Send UDP traffic on the imaze port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the imaze port.
Domain to not audit.
Receive UDP traffic on the imaze port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the imaze port.
Domain to not audit.
Send and receive UDP traffic on the imaze port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the imaze port.
Domain to not audit.
Bind TCP sockets to the imaze port.
Domain allowed access.
Bind UDP sockets to the imaze port.
Domain allowed access.
Make a TCP connection to the imaze port.
Domain allowed access.
Send imaze_client packets.
Domain allowed access.
Do not audit attempts to send imaze_client packets.
Domain to not audit.
Receive imaze_client packets.
Domain allowed access.
Do not audit attempts to receive imaze_client packets.
Domain allowed access.
Send and receive imaze_client packets.
Domain allowed access.
Do not audit attempts to send and receive imaze_client packets.
Domain to not audit.
Relabel packets to imaze_client the packet type.
Domain allowed access.
Send imaze_server packets.
Domain allowed access.
Do not audit attempts to send imaze_server packets.
Domain to not audit.
Receive imaze_server packets.
Domain allowed access.
Do not audit attempts to receive imaze_server packets.
Domain allowed access.
Send and receive imaze_server packets.
Domain allowed access.
Do not audit attempts to send and receive imaze_server packets.
Domain to not audit.
Relabel packets to imaze_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the inetd_child port.
Domain allowed access.
Send UDP traffic on the inetd_child port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the inetd_child port.
Domain to not audit.
Receive UDP traffic on the inetd_child port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the inetd_child port.
Domain to not audit.
Send and receive UDP traffic on the inetd_child port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the inetd_child port.
Domain to not audit.
Bind TCP sockets to the inetd_child port.
Domain allowed access.
Bind UDP sockets to the inetd_child port.
Domain allowed access.
Make a TCP connection to the inetd_child port.
Domain allowed access.
Send inetd_child_client packets.
Domain allowed access.
Do not audit attempts to send inetd_child_client packets.
Domain to not audit.
Receive inetd_child_client packets.
Domain allowed access.
Do not audit attempts to receive inetd_child_client packets.
Domain allowed access.
Send and receive inetd_child_client packets.
Domain allowed access.
Do not audit attempts to send and receive inetd_child_client packets.
Domain to not audit.
Relabel packets to inetd_child_client the packet type.
Domain allowed access.
Send inetd_child_server packets.
Domain allowed access.
Do not audit attempts to send inetd_child_server packets.
Domain to not audit.
Receive inetd_child_server packets.
Domain allowed access.
Do not audit attempts to receive inetd_child_server packets.
Domain allowed access.
Send and receive inetd_child_server packets.
Domain allowed access.
Do not audit attempts to send and receive inetd_child_server packets.
Domain to not audit.
Relabel packets to inetd_child_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the innd port.
Domain allowed access.
Send UDP traffic on the innd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the innd port.
Domain to not audit.
Receive UDP traffic on the innd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the innd port.
Domain to not audit.
Send and receive UDP traffic on the innd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the innd port.
Domain to not audit.
Bind TCP sockets to the innd port.
Domain allowed access.
Bind UDP sockets to the innd port.
Domain allowed access.
Make a TCP connection to the innd port.
Domain allowed access.
Send innd_client packets.
Domain allowed access.
Do not audit attempts to send innd_client packets.
Domain to not audit.
Receive innd_client packets.
Domain allowed access.
Do not audit attempts to receive innd_client packets.
Domain allowed access.
Send and receive innd_client packets.
Domain allowed access.
Do not audit attempts to send and receive innd_client packets.
Domain to not audit.
Relabel packets to innd_client the packet type.
Domain allowed access.
Send innd_server packets.
Domain allowed access.
Do not audit attempts to send innd_server packets.
Domain to not audit.
Receive innd_server packets.
Domain allowed access.
Do not audit attempts to receive innd_server packets.
Domain allowed access.
Send and receive innd_server packets.
Domain allowed access.
Do not audit attempts to send and receive innd_server packets.
Domain to not audit.
Relabel packets to innd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ionixnetmon port.
Domain allowed access.
Send UDP traffic on the ionixnetmon port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ionixnetmon port.
Domain to not audit.
Receive UDP traffic on the ionixnetmon port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ionixnetmon port.
Domain to not audit.
Send and receive UDP traffic on the ionixnetmon port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ionixnetmon port.
Domain to not audit.
Bind TCP sockets to the ionixnetmon port.
Domain allowed access.
Bind UDP sockets to the ionixnetmon port.
Domain allowed access.
Make a TCP connection to the ionixnetmon port.
Domain allowed access.
Send ionixnetmon_client packets.
Domain allowed access.
Do not audit attempts to send ionixnetmon_client packets.
Domain to not audit.
Receive ionixnetmon_client packets.
Domain allowed access.
Do not audit attempts to receive ionixnetmon_client packets.
Domain allowed access.
Send and receive ionixnetmon_client packets.
Domain allowed access.
Do not audit attempts to send and receive ionixnetmon_client packets.
Domain to not audit.
Relabel packets to ionixnetmon_client the packet type.
Domain allowed access.
Send ionixnetmon_server packets.
Domain allowed access.
Do not audit attempts to send ionixnetmon_server packets.
Domain to not audit.
Receive ionixnetmon_server packets.
Domain allowed access.
Do not audit attempts to receive ionixnetmon_server packets.
Domain allowed access.
Send and receive ionixnetmon_server packets.
Domain allowed access.
Do not audit attempts to send and receive ionixnetmon_server packets.
Domain to not audit.
Relabel packets to ionixnetmon_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ipmi port.
Domain allowed access.
Send UDP traffic on the ipmi port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ipmi port.
Domain to not audit.
Receive UDP traffic on the ipmi port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ipmi port.
Domain to not audit.
Send and receive UDP traffic on the ipmi port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ipmi port.
Domain to not audit.
Bind TCP sockets to the ipmi port.
Domain allowed access.
Bind UDP sockets to the ipmi port.
Domain allowed access.
Make a TCP connection to the ipmi port.
Domain allowed access.
Send ipmi_client packets.
Domain allowed access.
Do not audit attempts to send ipmi_client packets.
Domain to not audit.
Receive ipmi_client packets.
Domain allowed access.
Do not audit attempts to receive ipmi_client packets.
Domain allowed access.
Send and receive ipmi_client packets.
Domain allowed access.
Do not audit attempts to send and receive ipmi_client packets.
Domain to not audit.
Relabel packets to ipmi_client the packet type.
Domain allowed access.
Send ipmi_server packets.
Domain allowed access.
Do not audit attempts to send ipmi_server packets.
Domain to not audit.
Receive ipmi_server packets.
Domain allowed access.
Do not audit attempts to receive ipmi_server packets.
Domain allowed access.
Send and receive ipmi_server packets.
Domain allowed access.
Do not audit attempts to send and receive ipmi_server packets.
Domain to not audit.
Relabel packets to ipmi_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ipp port.
Domain allowed access.
Send UDP traffic on the ipp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ipp port.
Domain to not audit.
Receive UDP traffic on the ipp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ipp port.
Domain to not audit.
Send and receive UDP traffic on the ipp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ipp port.
Domain to not audit.
Bind TCP sockets to the ipp port.
Domain allowed access.
Bind UDP sockets to the ipp port.
Domain allowed access.
Make a TCP connection to the ipp port.
Domain allowed access.
Send ipp_client packets.
Domain allowed access.
Do not audit attempts to send ipp_client packets.
Domain to not audit.
Receive ipp_client packets.
Domain allowed access.
Do not audit attempts to receive ipp_client packets.
Domain allowed access.
Send and receive ipp_client packets.
Domain allowed access.
Do not audit attempts to send and receive ipp_client packets.
Domain to not audit.
Relabel packets to ipp_client the packet type.
Domain allowed access.
Send ipp_server packets.
Domain allowed access.
Do not audit attempts to send ipp_server packets.
Domain to not audit.
Receive ipp_server packets.
Domain allowed access.
Do not audit attempts to receive ipp_server packets.
Domain allowed access.
Send and receive ipp_server packets.
Domain allowed access.
Do not audit attempts to send and receive ipp_server packets.
Domain to not audit.
Relabel packets to ipp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ipsecnat port.
Domain allowed access.
Send UDP traffic on the ipsecnat port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ipsecnat port.
Domain to not audit.
Receive UDP traffic on the ipsecnat port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ipsecnat port.
Domain to not audit.
Send and receive UDP traffic on the ipsecnat port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ipsecnat port.
Domain to not audit.
Bind TCP sockets to the ipsecnat port.
Domain allowed access.
Bind UDP sockets to the ipsecnat port.
Domain allowed access.
Make a TCP connection to the ipsecnat port.
Domain allowed access.
Send ipsecnat_client packets.
Domain allowed access.
Do not audit attempts to send ipsecnat_client packets.
Domain to not audit.
Receive ipsecnat_client packets.
Domain allowed access.
Do not audit attempts to receive ipsecnat_client packets.
Domain allowed access.
Send and receive ipsecnat_client packets.
Domain allowed access.
Do not audit attempts to send and receive ipsecnat_client packets.
Domain to not audit.
Relabel packets to ipsecnat_client the packet type.
Domain allowed access.
Send ipsecnat_server packets.
Domain allowed access.
Do not audit attempts to send ipsecnat_server packets.
Domain to not audit.
Receive ipsecnat_server packets.
Domain allowed access.
Do not audit attempts to receive ipsecnat_server packets.
Domain allowed access.
Send and receive ipsecnat_server packets.
Domain allowed access.
Do not audit attempts to send and receive ipsecnat_server packets.
Domain to not audit.
Relabel packets to ipsecnat_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ircd port.
Domain allowed access.
Send UDP traffic on the ircd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ircd port.
Domain to not audit.
Receive UDP traffic on the ircd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ircd port.
Domain to not audit.
Send and receive UDP traffic on the ircd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ircd port.
Domain to not audit.
Bind TCP sockets to the ircd port.
Domain allowed access.
Bind UDP sockets to the ircd port.
Domain allowed access.
Make a TCP connection to the ircd port.
Domain allowed access.
Send ircd_client packets.
Domain allowed access.
Do not audit attempts to send ircd_client packets.
Domain to not audit.
Receive ircd_client packets.
Domain allowed access.
Do not audit attempts to receive ircd_client packets.
Domain allowed access.
Send and receive ircd_client packets.
Domain allowed access.
Do not audit attempts to send and receive ircd_client packets.
Domain to not audit.
Relabel packets to ircd_client the packet type.
Domain allowed access.
Send ircd_server packets.
Domain allowed access.
Do not audit attempts to send ircd_server packets.
Domain to not audit.
Receive ircd_server packets.
Domain allowed access.
Do not audit attempts to receive ircd_server packets.
Domain allowed access.
Send and receive ircd_server packets.
Domain allowed access.
Do not audit attempts to send and receive ircd_server packets.
Domain to not audit.
Relabel packets to ircd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the isakmp port.
Domain allowed access.
Send UDP traffic on the isakmp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the isakmp port.
Domain to not audit.
Receive UDP traffic on the isakmp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the isakmp port.
Domain to not audit.
Send and receive UDP traffic on the isakmp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the isakmp port.
Domain to not audit.
Bind TCP sockets to the isakmp port.
Domain allowed access.
Bind UDP sockets to the isakmp port.
Domain allowed access.
Make a TCP connection to the isakmp port.
Domain allowed access.
Send isakmp_client packets.
Domain allowed access.
Do not audit attempts to send isakmp_client packets.
Domain to not audit.
Receive isakmp_client packets.
Domain allowed access.
Do not audit attempts to receive isakmp_client packets.
Domain allowed access.
Send and receive isakmp_client packets.
Domain allowed access.
Do not audit attempts to send and receive isakmp_client packets.
Domain to not audit.
Relabel packets to isakmp_client the packet type.
Domain allowed access.
Send isakmp_server packets.
Domain allowed access.
Do not audit attempts to send isakmp_server packets.
Domain to not audit.
Receive isakmp_server packets.
Domain allowed access.
Do not audit attempts to receive isakmp_server packets.
Domain allowed access.
Send and receive isakmp_server packets.
Domain allowed access.
Do not audit attempts to send and receive isakmp_server packets.
Domain to not audit.
Relabel packets to isakmp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the iscsi port.
Domain allowed access.
Send UDP traffic on the iscsi port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the iscsi port.
Domain to not audit.
Receive UDP traffic on the iscsi port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the iscsi port.
Domain to not audit.
Send and receive UDP traffic on the iscsi port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the iscsi port.
Domain to not audit.
Bind TCP sockets to the iscsi port.
Domain allowed access.
Bind UDP sockets to the iscsi port.
Domain allowed access.
Make a TCP connection to the iscsi port.
Domain allowed access.
Send iscsi_client packets.
Domain allowed access.
Do not audit attempts to send iscsi_client packets.
Domain to not audit.
Receive iscsi_client packets.
Domain allowed access.
Do not audit attempts to receive iscsi_client packets.
Domain allowed access.
Send and receive iscsi_client packets.
Domain allowed access.
Do not audit attempts to send and receive iscsi_client packets.
Domain to not audit.
Relabel packets to iscsi_client the packet type.
Domain allowed access.
Send iscsi_server packets.
Domain allowed access.
Do not audit attempts to send iscsi_server packets.
Domain to not audit.
Receive iscsi_server packets.
Domain allowed access.
Do not audit attempts to receive iscsi_server packets.
Domain allowed access.
Send and receive iscsi_server packets.
Domain allowed access.
Do not audit attempts to send and receive iscsi_server packets.
Domain to not audit.
Relabel packets to iscsi_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the isns port.
Domain allowed access.
Send UDP traffic on the isns port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the isns port.
Domain to not audit.
Receive UDP traffic on the isns port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the isns port.
Domain to not audit.
Send and receive UDP traffic on the isns port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the isns port.
Domain to not audit.
Bind TCP sockets to the isns port.
Domain allowed access.
Bind UDP sockets to the isns port.
Domain allowed access.
Make a TCP connection to the isns port.
Domain allowed access.
Send isns_client packets.
Domain allowed access.
Do not audit attempts to send isns_client packets.
Domain to not audit.
Receive isns_client packets.
Domain allowed access.
Do not audit attempts to receive isns_client packets.
Domain allowed access.
Send and receive isns_client packets.
Domain allowed access.
Do not audit attempts to send and receive isns_client packets.
Domain to not audit.
Relabel packets to isns_client the packet type.
Domain allowed access.
Send isns_server packets.
Domain allowed access.
Do not audit attempts to send isns_server packets.
Domain to not audit.
Receive isns_server packets.
Domain allowed access.
Do not audit attempts to receive isns_server packets.
Domain allowed access.
Send and receive isns_server packets.
Domain allowed access.
Do not audit attempts to send and receive isns_server packets.
Domain to not audit.
Relabel packets to isns_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jabber_client port.
Domain allowed access.
Send UDP traffic on the jabber_client port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jabber_client port.
Domain to not audit.
Receive UDP traffic on the jabber_client port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jabber_client port.
Domain to not audit.
Send and receive UDP traffic on the jabber_client port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jabber_client port.
Domain to not audit.
Bind TCP sockets to the jabber_client port.
Domain allowed access.
Bind UDP sockets to the jabber_client port.
Domain allowed access.
Make a TCP connection to the jabber_client port.
Domain allowed access.
Send jabber_client_client packets.
Domain allowed access.
Do not audit attempts to send jabber_client_client packets.
Domain to not audit.
Receive jabber_client_client packets.
Domain allowed access.
Do not audit attempts to receive jabber_client_client packets.
Domain allowed access.
Send and receive jabber_client_client packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_client_client packets.
Domain to not audit.
Relabel packets to jabber_client_client the packet type.
Domain allowed access.
Send jabber_client_server packets.
Domain allowed access.
Do not audit attempts to send jabber_client_server packets.
Domain to not audit.
Receive jabber_client_server packets.
Domain allowed access.
Do not audit attempts to receive jabber_client_server packets.
Domain allowed access.
Send and receive jabber_client_server packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_client_server packets.
Domain to not audit.
Relabel packets to jabber_client_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jabber_interserver port.
Domain allowed access.
Send UDP traffic on the jabber_interserver port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jabber_interserver port.
Domain to not audit.
Receive UDP traffic on the jabber_interserver port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jabber_interserver port.
Domain to not audit.
Send and receive UDP traffic on the jabber_interserver port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jabber_interserver port.
Domain to not audit.
Bind TCP sockets to the jabber_interserver port.
Domain allowed access.
Bind UDP sockets to the jabber_interserver port.
Domain allowed access.
Make a TCP connection to the jabber_interserver port.
Domain allowed access.
Send jabber_interserver_client packets.
Domain allowed access.
Do not audit attempts to send jabber_interserver_client packets.
Domain to not audit.
Receive jabber_interserver_client packets.
Domain allowed access.
Do not audit attempts to receive jabber_interserver_client packets.
Domain allowed access.
Send and receive jabber_interserver_client packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_interserver_client packets.
Domain to not audit.
Relabel packets to jabber_interserver_client the packet type.
Domain allowed access.
Send jabber_interserver_server packets.
Domain allowed access.
Do not audit attempts to send jabber_interserver_server packets.
Domain to not audit.
Receive jabber_interserver_server packets.
Domain allowed access.
Do not audit attempts to receive jabber_interserver_server packets.
Domain allowed access.
Send and receive jabber_interserver_server packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_interserver_server packets.
Domain to not audit.
Relabel packets to jabber_interserver_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jabber_router port.
Domain allowed access.
Send UDP traffic on the jabber_router port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jabber_router port.
Domain to not audit.
Receive UDP traffic on the jabber_router port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jabber_router port.
Domain to not audit.
Send and receive UDP traffic on the jabber_router port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jabber_router port.
Domain to not audit.
Bind TCP sockets to the jabber_router port.
Domain allowed access.
Bind UDP sockets to the jabber_router port.
Domain allowed access.
Make a TCP connection to the jabber_router port.
Domain allowed access.
Send jabber_router_client packets.
Domain allowed access.
Do not audit attempts to send jabber_router_client packets.
Domain to not audit.
Receive jabber_router_client packets.
Domain allowed access.
Do not audit attempts to receive jabber_router_client packets.
Domain allowed access.
Send and receive jabber_router_client packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_router_client packets.
Domain to not audit.
Relabel packets to jabber_router_client the packet type.
Domain allowed access.
Send jabber_router_server packets.
Domain allowed access.
Do not audit attempts to send jabber_router_server packets.
Domain to not audit.
Receive jabber_router_server packets.
Domain allowed access.
Do not audit attempts to receive jabber_router_server packets.
Domain allowed access.
Send and receive jabber_router_server packets.
Domain allowed access.
Do not audit attempts to send and receive jabber_router_server packets.
Domain to not audit.
Relabel packets to jabber_router_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jacorb port.
Domain allowed access.
Send UDP traffic on the jacorb port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jacorb port.
Domain to not audit.
Receive UDP traffic on the jacorb port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jacorb port.
Domain to not audit.
Send and receive UDP traffic on the jacorb port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jacorb port.
Domain to not audit.
Bind TCP sockets to the jacorb port.
Domain allowed access.
Bind UDP sockets to the jacorb port.
Domain allowed access.
Make a TCP connection to the jacorb port.
Domain allowed access.
Send jacorb_client packets.
Domain allowed access.
Do not audit attempts to send jacorb_client packets.
Domain to not audit.
Receive jacorb_client packets.
Domain allowed access.
Do not audit attempts to receive jacorb_client packets.
Domain allowed access.
Send and receive jacorb_client packets.
Domain allowed access.
Do not audit attempts to send and receive jacorb_client packets.
Domain to not audit.
Relabel packets to jacorb_client the packet type.
Domain allowed access.
Send jacorb_server packets.
Domain allowed access.
Do not audit attempts to send jacorb_server packets.
Domain to not audit.
Receive jacorb_server packets.
Domain allowed access.
Do not audit attempts to receive jacorb_server packets.
Domain allowed access.
Send and receive jacorb_server packets.
Domain allowed access.
Do not audit attempts to send and receive jacorb_server packets.
Domain to not audit.
Relabel packets to jacorb_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jboss_debug port.
Domain allowed access.
Send UDP traffic on the jboss_debug port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jboss_debug port.
Domain to not audit.
Receive UDP traffic on the jboss_debug port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jboss_debug port.
Domain to not audit.
Send and receive UDP traffic on the jboss_debug port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jboss_debug port.
Domain to not audit.
Bind TCP sockets to the jboss_debug port.
Domain allowed access.
Bind UDP sockets to the jboss_debug port.
Domain allowed access.
Make a TCP connection to the jboss_debug port.
Domain allowed access.
Send jboss_debug_client packets.
Domain allowed access.
Do not audit attempts to send jboss_debug_client packets.
Domain to not audit.
Receive jboss_debug_client packets.
Domain allowed access.
Do not audit attempts to receive jboss_debug_client packets.
Domain allowed access.
Send and receive jboss_debug_client packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_debug_client packets.
Domain to not audit.
Relabel packets to jboss_debug_client the packet type.
Domain allowed access.
Send jboss_debug_server packets.
Domain allowed access.
Do not audit attempts to send jboss_debug_server packets.
Domain to not audit.
Receive jboss_debug_server packets.
Domain allowed access.
Do not audit attempts to receive jboss_debug_server packets.
Domain allowed access.
Send and receive jboss_debug_server packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_debug_server packets.
Domain to not audit.
Relabel packets to jboss_debug_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jboss_messaging port.
Domain allowed access.
Send UDP traffic on the jboss_messaging port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jboss_messaging port.
Domain to not audit.
Receive UDP traffic on the jboss_messaging port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jboss_messaging port.
Domain to not audit.
Send and receive UDP traffic on the jboss_messaging port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jboss_messaging port.
Domain to not audit.
Bind TCP sockets to the jboss_messaging port.
Domain allowed access.
Bind UDP sockets to the jboss_messaging port.
Domain allowed access.
Make a TCP connection to the jboss_messaging port.
Domain allowed access.
Send jboss_messaging_client packets.
Domain allowed access.
Do not audit attempts to send jboss_messaging_client packets.
Domain to not audit.
Receive jboss_messaging_client packets.
Domain allowed access.
Do not audit attempts to receive jboss_messaging_client packets.
Domain allowed access.
Send and receive jboss_messaging_client packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_messaging_client packets.
Domain to not audit.
Relabel packets to jboss_messaging_client the packet type.
Domain allowed access.
Send jboss_messaging_server packets.
Domain allowed access.
Do not audit attempts to send jboss_messaging_server packets.
Domain to not audit.
Receive jboss_messaging_server packets.
Domain allowed access.
Do not audit attempts to receive jboss_messaging_server packets.
Domain allowed access.
Send and receive jboss_messaging_server packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_messaging_server packets.
Domain to not audit.
Relabel packets to jboss_messaging_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the jboss_management port.
Domain allowed access.
Send UDP traffic on the jboss_management port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the jboss_management port.
Domain to not audit.
Receive UDP traffic on the jboss_management port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the jboss_management port.
Domain to not audit.
Send and receive UDP traffic on the jboss_management port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the jboss_management port.
Domain to not audit.
Bind TCP sockets to the jboss_management port.
Domain allowed access.
Bind UDP sockets to the jboss_management port.
Domain allowed access.
Make a TCP connection to the jboss_management port.
Domain allowed access.
Send jboss_management_client packets.
Domain allowed access.
Do not audit attempts to send jboss_management_client packets.
Domain to not audit.
Receive jboss_management_client packets.
Domain allowed access.
Do not audit attempts to receive jboss_management_client packets.
Domain allowed access.
Send and receive jboss_management_client packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_management_client packets.
Domain to not audit.
Relabel packets to jboss_management_client the packet type.
Domain allowed access.
Send jboss_management_server packets.
Domain allowed access.
Do not audit attempts to send jboss_management_server packets.
Domain to not audit.
Receive jboss_management_server packets.
Domain allowed access.
Do not audit attempts to receive jboss_management_server packets.
Domain allowed access.
Send and receive jboss_management_server packets.
Domain allowed access.
Do not audit attempts to send and receive jboss_management_server packets.
Domain to not audit.
Relabel packets to jboss_management_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kerberos port.
Domain allowed access.
Send UDP traffic on the kerberos port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kerberos port.
Domain to not audit.
Receive UDP traffic on the kerberos port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kerberos port.
Domain to not audit.
Send and receive UDP traffic on the kerberos port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kerberos port.
Domain to not audit.
Bind TCP sockets to the kerberos port.
Domain allowed access.
Bind UDP sockets to the kerberos port.
Domain allowed access.
Make a TCP connection to the kerberos port.
Domain allowed access.
Send kerberos_client packets.
Domain allowed access.
Do not audit attempts to send kerberos_client packets.
Domain to not audit.
Receive kerberos_client packets.
Domain allowed access.
Do not audit attempts to receive kerberos_client packets.
Domain allowed access.
Send and receive kerberos_client packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_client packets.
Domain to not audit.
Relabel packets to kerberos_client the packet type.
Domain allowed access.
Send kerberos_server packets.
Domain allowed access.
Do not audit attempts to send kerberos_server packets.
Domain to not audit.
Receive kerberos_server packets.
Domain allowed access.
Do not audit attempts to receive kerberos_server packets.
Domain allowed access.
Send and receive kerberos_server packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_server packets.
Domain to not audit.
Relabel packets to kerberos_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kerberos_admin port.
Domain allowed access.
Send UDP traffic on the kerberos_admin port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kerberos_admin port.
Domain to not audit.
Receive UDP traffic on the kerberos_admin port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kerberos_admin port.
Domain to not audit.
Send and receive UDP traffic on the kerberos_admin port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kerberos_admin port.
Domain to not audit.
Bind TCP sockets to the kerberos_admin port.
Domain allowed access.
Bind UDP sockets to the kerberos_admin port.
Domain allowed access.
Make a TCP connection to the kerberos_admin port.
Domain allowed access.
Send kerberos_admin_client packets.
Domain allowed access.
Do not audit attempts to send kerberos_admin_client packets.
Domain to not audit.
Receive kerberos_admin_client packets.
Domain allowed access.
Do not audit attempts to receive kerberos_admin_client packets.
Domain allowed access.
Send and receive kerberos_admin_client packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_admin_client packets.
Domain to not audit.
Relabel packets to kerberos_admin_client the packet type.
Domain allowed access.
Send kerberos_admin_server packets.
Domain allowed access.
Do not audit attempts to send kerberos_admin_server packets.
Domain to not audit.
Receive kerberos_admin_server packets.
Domain allowed access.
Do not audit attempts to receive kerberos_admin_server packets.
Domain allowed access.
Send and receive kerberos_admin_server packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_admin_server packets.
Domain to not audit.
Relabel packets to kerberos_admin_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kerberos_master port.
Domain allowed access.
Send UDP traffic on the kerberos_master port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kerberos_master port.
Domain to not audit.
Receive UDP traffic on the kerberos_master port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kerberos_master port.
Domain to not audit.
Send and receive UDP traffic on the kerberos_master port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kerberos_master port.
Domain to not audit.
Bind TCP sockets to the kerberos_master port.
Domain allowed access.
Bind UDP sockets to the kerberos_master port.
Domain allowed access.
Make a TCP connection to the kerberos_master port.
Domain allowed access.
Send kerberos_master_client packets.
Domain allowed access.
Do not audit attempts to send kerberos_master_client packets.
Domain to not audit.
Receive kerberos_master_client packets.
Domain allowed access.
Do not audit attempts to receive kerberos_master_client packets.
Domain allowed access.
Send and receive kerberos_master_client packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_master_client packets.
Domain to not audit.
Relabel packets to kerberos_master_client the packet type.
Domain allowed access.
Send kerberos_master_server packets.
Domain allowed access.
Do not audit attempts to send kerberos_master_server packets.
Domain to not audit.
Receive kerberos_master_server packets.
Domain allowed access.
Do not audit attempts to receive kerberos_master_server packets.
Domain allowed access.
Send and receive kerberos_master_server packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_master_server packets.
Domain to not audit.
Relabel packets to kerberos_master_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kerberos_password port.
Domain allowed access.
Send UDP traffic on the kerberos_password port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kerberos_password port.
Domain to not audit.
Receive UDP traffic on the kerberos_password port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kerberos_password port.
Domain to not audit.
Send and receive UDP traffic on the kerberos_password port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kerberos_password port.
Domain to not audit.
Bind TCP sockets to the kerberos_password port.
Domain allowed access.
Bind UDP sockets to the kerberos_password port.
Domain allowed access.
Make a TCP connection to the kerberos_password port.
Domain allowed access.
Send kerberos_password_client packets.
Domain allowed access.
Do not audit attempts to send kerberos_password_client packets.
Domain to not audit.
Receive kerberos_password_client packets.
Domain allowed access.
Do not audit attempts to receive kerberos_password_client packets.
Domain allowed access.
Send and receive kerberos_password_client packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_password_client packets.
Domain to not audit.
Relabel packets to kerberos_password_client the packet type.
Domain allowed access.
Send kerberos_password_server packets.
Domain allowed access.
Do not audit attempts to send kerberos_password_server packets.
Domain to not audit.
Receive kerberos_password_server packets.
Domain allowed access.
Do not audit attempts to receive kerberos_password_server packets.
Domain allowed access.
Send and receive kerberos_password_server packets.
Domain allowed access.
Do not audit attempts to send and receive kerberos_password_server packets.
Domain to not audit.
Relabel packets to kerberos_password_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kismet port.
Domain allowed access.
Send UDP traffic on the kismet port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kismet port.
Domain to not audit.
Receive UDP traffic on the kismet port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kismet port.
Domain to not audit.
Send and receive UDP traffic on the kismet port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kismet port.
Domain to not audit.
Bind TCP sockets to the kismet port.
Domain allowed access.
Bind UDP sockets to the kismet port.
Domain allowed access.
Make a TCP connection to the kismet port.
Domain allowed access.
Send kismet_client packets.
Domain allowed access.
Do not audit attempts to send kismet_client packets.
Domain to not audit.
Receive kismet_client packets.
Domain allowed access.
Do not audit attempts to receive kismet_client packets.
Domain allowed access.
Send and receive kismet_client packets.
Domain allowed access.
Do not audit attempts to send and receive kismet_client packets.
Domain to not audit.
Relabel packets to kismet_client the packet type.
Domain allowed access.
Send kismet_server packets.
Domain allowed access.
Do not audit attempts to send kismet_server packets.
Domain to not audit.
Receive kismet_server packets.
Domain allowed access.
Do not audit attempts to receive kismet_server packets.
Domain allowed access.
Send and receive kismet_server packets.
Domain allowed access.
Do not audit attempts to send and receive kismet_server packets.
Domain to not audit.
Relabel packets to kismet_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the kprop port.
Domain allowed access.
Send UDP traffic on the kprop port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the kprop port.
Domain to not audit.
Receive UDP traffic on the kprop port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the kprop port.
Domain to not audit.
Send and receive UDP traffic on the kprop port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the kprop port.
Domain to not audit.
Bind TCP sockets to the kprop port.
Domain allowed access.
Bind UDP sockets to the kprop port.
Domain allowed access.
Make a TCP connection to the kprop port.
Domain allowed access.
Send kprop_client packets.
Domain allowed access.
Do not audit attempts to send kprop_client packets.
Domain to not audit.
Receive kprop_client packets.
Domain allowed access.
Do not audit attempts to receive kprop_client packets.
Domain allowed access.
Send and receive kprop_client packets.
Domain allowed access.
Do not audit attempts to send and receive kprop_client packets.
Domain to not audit.
Relabel packets to kprop_client the packet type.
Domain allowed access.
Send kprop_server packets.
Domain allowed access.
Do not audit attempts to send kprop_server packets.
Domain to not audit.
Receive kprop_server packets.
Domain allowed access.
Do not audit attempts to receive kprop_server packets.
Domain allowed access.
Send and receive kprop_server packets.
Domain allowed access.
Do not audit attempts to send and receive kprop_server packets.
Domain to not audit.
Relabel packets to kprop_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ktalkd port.
Domain allowed access.
Send UDP traffic on the ktalkd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ktalkd port.
Domain to not audit.
Receive UDP traffic on the ktalkd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ktalkd port.
Domain to not audit.
Send and receive UDP traffic on the ktalkd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ktalkd port.
Domain to not audit.
Bind TCP sockets to the ktalkd port.
Domain allowed access.
Bind UDP sockets to the ktalkd port.
Domain allowed access.
Make a TCP connection to the ktalkd port.
Domain allowed access.
Send ktalkd_client packets.
Domain allowed access.
Do not audit attempts to send ktalkd_client packets.
Domain to not audit.
Receive ktalkd_client packets.
Domain allowed access.
Do not audit attempts to receive ktalkd_client packets.
Domain allowed access.
Send and receive ktalkd_client packets.
Domain allowed access.
Do not audit attempts to send and receive ktalkd_client packets.
Domain to not audit.
Relabel packets to ktalkd_client the packet type.
Domain allowed access.
Send ktalkd_server packets.
Domain allowed access.
Do not audit attempts to send ktalkd_server packets.
Domain to not audit.
Receive ktalkd_server packets.
Domain allowed access.
Do not audit attempts to receive ktalkd_server packets.
Domain allowed access.
Send and receive ktalkd_server packets.
Domain allowed access.
Do not audit attempts to send and receive ktalkd_server packets.
Domain to not audit.
Relabel packets to ktalkd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ldap port.
Domain allowed access.
Send UDP traffic on the ldap port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ldap port.
Domain to not audit.
Receive UDP traffic on the ldap port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ldap port.
Domain to not audit.
Send and receive UDP traffic on the ldap port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ldap port.
Domain to not audit.
Bind TCP sockets to the ldap port.
Domain allowed access.
Bind UDP sockets to the ldap port.
Domain allowed access.
Make a TCP connection to the ldap port.
Domain allowed access.
Send ldap_client packets.
Domain allowed access.
Do not audit attempts to send ldap_client packets.
Domain to not audit.
Receive ldap_client packets.
Domain allowed access.
Do not audit attempts to receive ldap_client packets.
Domain allowed access.
Send and receive ldap_client packets.
Domain allowed access.
Do not audit attempts to send and receive ldap_client packets.
Domain to not audit.
Relabel packets to ldap_client the packet type.
Domain allowed access.
Send ldap_server packets.
Domain allowed access.
Do not audit attempts to send ldap_server packets.
Domain to not audit.
Receive ldap_server packets.
Domain allowed access.
Do not audit attempts to receive ldap_server packets.
Domain allowed access.
Send and receive ldap_server packets.
Domain allowed access.
Do not audit attempts to send and receive ldap_server packets.
Domain to not audit.
Relabel packets to ldap_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the lmtp port.
Domain allowed access.
Send UDP traffic on the lmtp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the lmtp port.
Domain to not audit.
Receive UDP traffic on the lmtp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the lmtp port.
Domain to not audit.
Send and receive UDP traffic on the lmtp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the lmtp port.
Domain to not audit.
Bind TCP sockets to the lmtp port.
Domain allowed access.
Bind UDP sockets to the lmtp port.
Domain allowed access.
Make a TCP connection to the lmtp port.
Domain allowed access.
Send lmtp_client packets.
Domain allowed access.
Do not audit attempts to send lmtp_client packets.
Domain to not audit.
Receive lmtp_client packets.
Domain allowed access.
Do not audit attempts to receive lmtp_client packets.
Domain allowed access.
Send and receive lmtp_client packets.
Domain allowed access.
Do not audit attempts to send and receive lmtp_client packets.
Domain to not audit.
Relabel packets to lmtp_client the packet type.
Domain allowed access.
Send lmtp_server packets.
Domain allowed access.
Do not audit attempts to send lmtp_server packets.
Domain to not audit.
Receive lmtp_server packets.
Domain allowed access.
Do not audit attempts to receive lmtp_server packets.
Domain allowed access.
Send and receive lmtp_server packets.
Domain allowed access.
Do not audit attempts to send and receive lmtp_server packets.
Domain to not audit.
Relabel packets to lmtp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the lirc port.
Domain allowed access.
Send UDP traffic on the lirc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the lirc port.
Domain to not audit.
Receive UDP traffic on the lirc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the lirc port.
Domain to not audit.
Send and receive UDP traffic on the lirc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the lirc port.
Domain to not audit.
Bind TCP sockets to the lirc port.
Domain allowed access.
Bind UDP sockets to the lirc port.
Domain allowed access.
Make a TCP connection to the lirc port.
Domain allowed access.
Send lirc_client packets.
Domain allowed access.
Do not audit attempts to send lirc_client packets.
Domain to not audit.
Receive lirc_client packets.
Domain allowed access.
Do not audit attempts to receive lirc_client packets.
Domain allowed access.
Send and receive lirc_client packets.
Domain allowed access.
Do not audit attempts to send and receive lirc_client packets.
Domain to not audit.
Relabel packets to lirc_client the packet type.
Domain allowed access.
Send lirc_server packets.
Domain allowed access.
Do not audit attempts to send lirc_server packets.
Domain to not audit.
Receive lirc_server packets.
Domain allowed access.
Do not audit attempts to receive lirc_server packets.
Domain allowed access.
Send and receive lirc_server packets.
Domain allowed access.
Do not audit attempts to send and receive lirc_server packets.
Domain to not audit.
Relabel packets to lirc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the luci port.
Domain allowed access.
Send UDP traffic on the luci port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the luci port.
Domain to not audit.
Receive UDP traffic on the luci port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the luci port.
Domain to not audit.
Send and receive UDP traffic on the luci port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the luci port.
Domain to not audit.
Bind TCP sockets to the luci port.
Domain allowed access.
Bind UDP sockets to the luci port.
Domain allowed access.
Make a TCP connection to the luci port.
Domain allowed access.
Send luci_client packets.
Domain allowed access.
Do not audit attempts to send luci_client packets.
Domain to not audit.
Receive luci_client packets.
Domain allowed access.
Do not audit attempts to receive luci_client packets.
Domain allowed access.
Send and receive luci_client packets.
Domain allowed access.
Do not audit attempts to send and receive luci_client packets.
Domain to not audit.
Relabel packets to luci_client the packet type.
Domain allowed access.
Send luci_server packets.
Domain allowed access.
Do not audit attempts to send luci_server packets.
Domain to not audit.
Receive luci_server packets.
Domain allowed access.
Do not audit attempts to receive luci_server packets.
Domain allowed access.
Send and receive luci_server packets.
Domain allowed access.
Do not audit attempts to send and receive luci_server packets.
Domain to not audit.
Relabel packets to luci_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the l2tp port.
Domain allowed access.
Send UDP traffic on the l2tp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the l2tp port.
Domain to not audit.
Receive UDP traffic on the l2tp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the l2tp port.
Domain to not audit.
Send and receive UDP traffic on the l2tp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the l2tp port.
Domain to not audit.
Bind TCP sockets to the l2tp port.
Domain allowed access.
Bind UDP sockets to the l2tp port.
Domain allowed access.
Make a TCP connection to the l2tp port.
Domain allowed access.
Send l2tp_client packets.
Domain allowed access.
Do not audit attempts to send l2tp_client packets.
Domain to not audit.
Receive l2tp_client packets.
Domain allowed access.
Do not audit attempts to receive l2tp_client packets.
Domain allowed access.
Send and receive l2tp_client packets.
Domain allowed access.
Do not audit attempts to send and receive l2tp_client packets.
Domain to not audit.
Relabel packets to l2tp_client the packet type.
Domain allowed access.
Send l2tp_server packets.
Domain allowed access.
Do not audit attempts to send l2tp_server packets.
Domain to not audit.
Receive l2tp_server packets.
Domain allowed access.
Do not audit attempts to receive l2tp_server packets.
Domain allowed access.
Send and receive l2tp_server packets.
Domain allowed access.
Do not audit attempts to send and receive l2tp_server packets.
Domain to not audit.
Relabel packets to l2tp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mail port.
Domain allowed access.
Send UDP traffic on the mail port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mail port.
Domain to not audit.
Receive UDP traffic on the mail port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mail port.
Domain to not audit.
Send and receive UDP traffic on the mail port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mail port.
Domain to not audit.
Bind TCP sockets to the mail port.
Domain allowed access.
Bind UDP sockets to the mail port.
Domain allowed access.
Make a TCP connection to the mail port.
Domain allowed access.
Send mail_client packets.
Domain allowed access.
Do not audit attempts to send mail_client packets.
Domain to not audit.
Receive mail_client packets.
Domain allowed access.
Do not audit attempts to receive mail_client packets.
Domain allowed access.
Send and receive mail_client packets.
Domain allowed access.
Do not audit attempts to send and receive mail_client packets.
Domain to not audit.
Relabel packets to mail_client the packet type.
Domain allowed access.
Send mail_server packets.
Domain allowed access.
Do not audit attempts to send mail_server packets.
Domain to not audit.
Receive mail_server packets.
Domain allowed access.
Do not audit attempts to receive mail_server packets.
Domain allowed access.
Send and receive mail_server packets.
Domain allowed access.
Do not audit attempts to send and receive mail_server packets.
Domain to not audit.
Relabel packets to mail_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the matahari port.
Domain allowed access.
Send UDP traffic on the matahari port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the matahari port.
Domain to not audit.
Receive UDP traffic on the matahari port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the matahari port.
Domain to not audit.
Send and receive UDP traffic on the matahari port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the matahari port.
Domain to not audit.
Bind TCP sockets to the matahari port.
Domain allowed access.
Bind UDP sockets to the matahari port.
Domain allowed access.
Make a TCP connection to the matahari port.
Domain allowed access.
Send matahari_client packets.
Domain allowed access.
Do not audit attempts to send matahari_client packets.
Domain to not audit.
Receive matahari_client packets.
Domain allowed access.
Do not audit attempts to receive matahari_client packets.
Domain allowed access.
Send and receive matahari_client packets.
Domain allowed access.
Do not audit attempts to send and receive matahari_client packets.
Domain to not audit.
Relabel packets to matahari_client the packet type.
Domain allowed access.
Send matahari_server packets.
Domain allowed access.
Do not audit attempts to send matahari_server packets.
Domain to not audit.
Receive matahari_server packets.
Domain allowed access.
Do not audit attempts to receive matahari_server packets.
Domain allowed access.
Send and receive matahari_server packets.
Domain allowed access.
Do not audit attempts to send and receive matahari_server packets.
Domain to not audit.
Relabel packets to matahari_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the memcache port.
Domain allowed access.
Send UDP traffic on the memcache port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the memcache port.
Domain to not audit.
Receive UDP traffic on the memcache port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the memcache port.
Domain to not audit.
Send and receive UDP traffic on the memcache port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the memcache port.
Domain to not audit.
Bind TCP sockets to the memcache port.
Domain allowed access.
Bind UDP sockets to the memcache port.
Domain allowed access.
Make a TCP connection to the memcache port.
Domain allowed access.
Send memcache_client packets.
Domain allowed access.
Do not audit attempts to send memcache_client packets.
Domain to not audit.
Receive memcache_client packets.
Domain allowed access.
Do not audit attempts to receive memcache_client packets.
Domain allowed access.
Send and receive memcache_client packets.
Domain allowed access.
Do not audit attempts to send and receive memcache_client packets.
Domain to not audit.
Relabel packets to memcache_client the packet type.
Domain allowed access.
Send memcache_server packets.
Domain allowed access.
Do not audit attempts to send memcache_server packets.
Domain to not audit.
Receive memcache_server packets.
Domain allowed access.
Do not audit attempts to receive memcache_server packets.
Domain allowed access.
Send and receive memcache_server packets.
Domain allowed access.
Do not audit attempts to send and receive memcache_server packets.
Domain to not audit.
Relabel packets to memcache_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the milter port.
Domain allowed access.
Send UDP traffic on the milter port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the milter port.
Domain to not audit.
Receive UDP traffic on the milter port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the milter port.
Domain to not audit.
Send and receive UDP traffic on the milter port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the milter port.
Domain to not audit.
Bind TCP sockets to the milter port.
Domain allowed access.
Bind UDP sockets to the milter port.
Domain allowed access.
Make a TCP connection to the milter port.
Domain allowed access.
Send milter_client packets.
Domain allowed access.
Do not audit attempts to send milter_client packets.
Domain to not audit.
Receive milter_client packets.
Domain allowed access.
Do not audit attempts to receive milter_client packets.
Domain allowed access.
Send and receive milter_client packets.
Domain allowed access.
Do not audit attempts to send and receive milter_client packets.
Domain to not audit.
Relabel packets to milter_client the packet type.
Domain allowed access.
Send milter_server packets.
Domain allowed access.
Do not audit attempts to send milter_server packets.
Domain to not audit.
Receive milter_server packets.
Domain allowed access.
Do not audit attempts to receive milter_server packets.
Domain allowed access.
Send and receive milter_server packets.
Domain allowed access.
Do not audit attempts to send and receive milter_server packets.
Domain to not audit.
Relabel packets to milter_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mmcc port.
Domain allowed access.
Send UDP traffic on the mmcc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mmcc port.
Domain to not audit.
Receive UDP traffic on the mmcc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mmcc port.
Domain to not audit.
Send and receive UDP traffic on the mmcc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mmcc port.
Domain to not audit.
Bind TCP sockets to the mmcc port.
Domain allowed access.
Bind UDP sockets to the mmcc port.
Domain allowed access.
Make a TCP connection to the mmcc port.
Domain allowed access.
Send mmcc_client packets.
Domain allowed access.
Do not audit attempts to send mmcc_client packets.
Domain to not audit.
Receive mmcc_client packets.
Domain allowed access.
Do not audit attempts to receive mmcc_client packets.
Domain allowed access.
Send and receive mmcc_client packets.
Domain allowed access.
Do not audit attempts to send and receive mmcc_client packets.
Domain to not audit.
Relabel packets to mmcc_client the packet type.
Domain allowed access.
Send mmcc_server packets.
Domain allowed access.
Do not audit attempts to send mmcc_server packets.
Domain to not audit.
Receive mmcc_server packets.
Domain allowed access.
Do not audit attempts to receive mmcc_server packets.
Domain allowed access.
Send and receive mmcc_server packets.
Domain allowed access.
Do not audit attempts to send and receive mmcc_server packets.
Domain to not audit.
Relabel packets to mmcc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mongod port.
Domain allowed access.
Send UDP traffic on the mongod port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mongod port.
Domain to not audit.
Receive UDP traffic on the mongod port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mongod port.
Domain to not audit.
Send and receive UDP traffic on the mongod port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mongod port.
Domain to not audit.
Bind TCP sockets to the mongod port.
Domain allowed access.
Bind UDP sockets to the mongod port.
Domain allowed access.
Make a TCP connection to the mongod port.
Domain allowed access.
Send mongod_client packets.
Domain allowed access.
Do not audit attempts to send mongod_client packets.
Domain to not audit.
Receive mongod_client packets.
Domain allowed access.
Do not audit attempts to receive mongod_client packets.
Domain allowed access.
Send and receive mongod_client packets.
Domain allowed access.
Do not audit attempts to send and receive mongod_client packets.
Domain to not audit.
Relabel packets to mongod_client the packet type.
Domain allowed access.
Send mongod_server packets.
Domain allowed access.
Do not audit attempts to send mongod_server packets.
Domain to not audit.
Receive mongod_server packets.
Domain allowed access.
Do not audit attempts to receive mongod_server packets.
Domain allowed access.
Send and receive mongod_server packets.
Domain allowed access.
Do not audit attempts to send and receive mongod_server packets.
Domain to not audit.
Relabel packets to mongod_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the monopd port.
Domain allowed access.
Send UDP traffic on the monopd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the monopd port.
Domain to not audit.
Receive UDP traffic on the monopd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the monopd port.
Domain to not audit.
Send and receive UDP traffic on the monopd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the monopd port.
Domain to not audit.
Bind TCP sockets to the monopd port.
Domain allowed access.
Bind UDP sockets to the monopd port.
Domain allowed access.
Make a TCP connection to the monopd port.
Domain allowed access.
Send monopd_client packets.
Domain allowed access.
Do not audit attempts to send monopd_client packets.
Domain to not audit.
Receive monopd_client packets.
Domain allowed access.
Do not audit attempts to receive monopd_client packets.
Domain allowed access.
Send and receive monopd_client packets.
Domain allowed access.
Do not audit attempts to send and receive monopd_client packets.
Domain to not audit.
Relabel packets to monopd_client the packet type.
Domain allowed access.
Send monopd_server packets.
Domain allowed access.
Do not audit attempts to send monopd_server packets.
Domain to not audit.
Receive monopd_server packets.
Domain allowed access.
Do not audit attempts to receive monopd_server packets.
Domain allowed access.
Send and receive monopd_server packets.
Domain allowed access.
Do not audit attempts to send and receive monopd_server packets.
Domain to not audit.
Relabel packets to monopd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mpd port.
Domain allowed access.
Send UDP traffic on the mpd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mpd port.
Domain to not audit.
Receive UDP traffic on the mpd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mpd port.
Domain to not audit.
Send and receive UDP traffic on the mpd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mpd port.
Domain to not audit.
Bind TCP sockets to the mpd port.
Domain allowed access.
Bind UDP sockets to the mpd port.
Domain allowed access.
Make a TCP connection to the mpd port.
Domain allowed access.
Send mpd_client packets.
Domain allowed access.
Do not audit attempts to send mpd_client packets.
Domain to not audit.
Receive mpd_client packets.
Domain allowed access.
Do not audit attempts to receive mpd_client packets.
Domain allowed access.
Send and receive mpd_client packets.
Domain allowed access.
Do not audit attempts to send and receive mpd_client packets.
Domain to not audit.
Relabel packets to mpd_client the packet type.
Domain allowed access.
Send mpd_server packets.
Domain allowed access.
Do not audit attempts to send mpd_server packets.
Domain to not audit.
Receive mpd_server packets.
Domain allowed access.
Do not audit attempts to receive mpd_server packets.
Domain allowed access.
Send and receive mpd_server packets.
Domain allowed access.
Do not audit attempts to send and receive mpd_server packets.
Domain to not audit.
Relabel packets to mpd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the msnp port.
Domain allowed access.
Send UDP traffic on the msnp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the msnp port.
Domain to not audit.
Receive UDP traffic on the msnp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the msnp port.
Domain to not audit.
Send and receive UDP traffic on the msnp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the msnp port.
Domain to not audit.
Bind TCP sockets to the msnp port.
Domain allowed access.
Bind UDP sockets to the msnp port.
Domain allowed access.
Make a TCP connection to the msnp port.
Domain allowed access.
Send msnp_client packets.
Domain allowed access.
Do not audit attempts to send msnp_client packets.
Domain to not audit.
Receive msnp_client packets.
Domain allowed access.
Do not audit attempts to receive msnp_client packets.
Domain allowed access.
Send and receive msnp_client packets.
Domain allowed access.
Do not audit attempts to send and receive msnp_client packets.
Domain to not audit.
Relabel packets to msnp_client the packet type.
Domain allowed access.
Send msnp_server packets.
Domain allowed access.
Do not audit attempts to send msnp_server packets.
Domain to not audit.
Receive msnp_server packets.
Domain allowed access.
Do not audit attempts to receive msnp_server packets.
Domain allowed access.
Send and receive msnp_server packets.
Domain allowed access.
Do not audit attempts to send and receive msnp_server packets.
Domain to not audit.
Relabel packets to msnp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mssql port.
Domain allowed access.
Send UDP traffic on the mssql port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mssql port.
Domain to not audit.
Receive UDP traffic on the mssql port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mssql port.
Domain to not audit.
Send and receive UDP traffic on the mssql port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mssql port.
Domain to not audit.
Bind TCP sockets to the mssql port.
Domain allowed access.
Bind UDP sockets to the mssql port.
Domain allowed access.
Make a TCP connection to the mssql port.
Domain allowed access.
Send mssql_client packets.
Domain allowed access.
Do not audit attempts to send mssql_client packets.
Domain to not audit.
Receive mssql_client packets.
Domain allowed access.
Do not audit attempts to receive mssql_client packets.
Domain allowed access.
Send and receive mssql_client packets.
Domain allowed access.
Do not audit attempts to send and receive mssql_client packets.
Domain to not audit.
Relabel packets to mssql_client the packet type.
Domain allowed access.
Send mssql_server packets.
Domain allowed access.
Do not audit attempts to send mssql_server packets.
Domain to not audit.
Receive mssql_server packets.
Domain allowed access.
Do not audit attempts to receive mssql_server packets.
Domain allowed access.
Send and receive mssql_server packets.
Domain allowed access.
Do not audit attempts to send and receive mssql_server packets.
Domain to not audit.
Relabel packets to mssql_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the munin port.
Domain allowed access.
Send UDP traffic on the munin port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the munin port.
Domain to not audit.
Receive UDP traffic on the munin port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the munin port.
Domain to not audit.
Send and receive UDP traffic on the munin port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the munin port.
Domain to not audit.
Bind TCP sockets to the munin port.
Domain allowed access.
Bind UDP sockets to the munin port.
Domain allowed access.
Make a TCP connection to the munin port.
Domain allowed access.
Send munin_client packets.
Domain allowed access.
Do not audit attempts to send munin_client packets.
Domain to not audit.
Receive munin_client packets.
Domain allowed access.
Do not audit attempts to receive munin_client packets.
Domain allowed access.
Send and receive munin_client packets.
Domain allowed access.
Do not audit attempts to send and receive munin_client packets.
Domain to not audit.
Relabel packets to munin_client the packet type.
Domain allowed access.
Send munin_server packets.
Domain allowed access.
Do not audit attempts to send munin_server packets.
Domain to not audit.
Receive munin_server packets.
Domain allowed access.
Do not audit attempts to receive munin_server packets.
Domain allowed access.
Send and receive munin_server packets.
Domain allowed access.
Do not audit attempts to send and receive munin_server packets.
Domain to not audit.
Relabel packets to munin_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mysqld port.
Domain allowed access.
Send UDP traffic on the mysqld port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mysqld port.
Domain to not audit.
Receive UDP traffic on the mysqld port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mysqld port.
Domain to not audit.
Send and receive UDP traffic on the mysqld port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mysqld port.
Domain to not audit.
Bind TCP sockets to the mysqld port.
Domain allowed access.
Bind UDP sockets to the mysqld port.
Domain allowed access.
Make a TCP connection to the mysqld port.
Domain allowed access.
Send mysqld_client packets.
Domain allowed access.
Do not audit attempts to send mysqld_client packets.
Domain to not audit.
Receive mysqld_client packets.
Domain allowed access.
Do not audit attempts to receive mysqld_client packets.
Domain allowed access.
Send and receive mysqld_client packets.
Domain allowed access.
Do not audit attempts to send and receive mysqld_client packets.
Domain to not audit.
Relabel packets to mysqld_client the packet type.
Domain allowed access.
Send mysqld_server packets.
Domain allowed access.
Do not audit attempts to send mysqld_server packets.
Domain to not audit.
Receive mysqld_server packets.
Domain allowed access.
Do not audit attempts to receive mysqld_server packets.
Domain allowed access.
Send and receive mysqld_server packets.
Domain allowed access.
Do not audit attempts to send and receive mysqld_server packets.
Domain to not audit.
Relabel packets to mysqld_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mysqlmanagerd port.
Domain allowed access.
Send UDP traffic on the mysqlmanagerd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
Domain to not audit.
Receive UDP traffic on the mysqlmanagerd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
Domain to not audit.
Send and receive UDP traffic on the mysqlmanagerd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mysqlmanagerd port.
Domain to not audit.
Bind TCP sockets to the mysqlmanagerd port.
Domain allowed access.
Bind UDP sockets to the mysqlmanagerd port.
Domain allowed access.
Make a TCP connection to the mysqlmanagerd port.
Domain allowed access.
Send mysqlmanagerd_client packets.
Domain allowed access.
Do not audit attempts to send mysqlmanagerd_client packets.
Domain to not audit.
Receive mysqlmanagerd_client packets.
Domain allowed access.
Do not audit attempts to receive mysqlmanagerd_client packets.
Domain allowed access.
Send and receive mysqlmanagerd_client packets.
Domain allowed access.
Do not audit attempts to send and receive mysqlmanagerd_client packets.
Domain to not audit.
Relabel packets to mysqlmanagerd_client the packet type.
Domain allowed access.
Send mysqlmanagerd_server packets.
Domain allowed access.
Do not audit attempts to send mysqlmanagerd_server packets.
Domain to not audit.
Receive mysqlmanagerd_server packets.
Domain allowed access.
Do not audit attempts to receive mysqlmanagerd_server packets.
Domain allowed access.
Send and receive mysqlmanagerd_server packets.
Domain allowed access.
Do not audit attempts to send and receive mysqlmanagerd_server packets.
Domain to not audit.
Relabel packets to mysqlmanagerd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the movaz_ssc port.
Domain allowed access.
Send UDP traffic on the movaz_ssc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the movaz_ssc port.
Domain to not audit.
Receive UDP traffic on the movaz_ssc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the movaz_ssc port.
Domain to not audit.
Send and receive UDP traffic on the movaz_ssc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the movaz_ssc port.
Domain to not audit.
Bind TCP sockets to the movaz_ssc port.
Domain allowed access.
Bind UDP sockets to the movaz_ssc port.
Domain allowed access.
Make a TCP connection to the movaz_ssc port.
Domain allowed access.
Send movaz_ssc_client packets.
Domain allowed access.
Do not audit attempts to send movaz_ssc_client packets.
Domain to not audit.
Receive movaz_ssc_client packets.
Domain allowed access.
Do not audit attempts to receive movaz_ssc_client packets.
Domain allowed access.
Send and receive movaz_ssc_client packets.
Domain allowed access.
Do not audit attempts to send and receive movaz_ssc_client packets.
Domain to not audit.
Relabel packets to movaz_ssc_client the packet type.
Domain allowed access.
Send movaz_ssc_server packets.
Domain allowed access.
Do not audit attempts to send movaz_ssc_server packets.
Domain to not audit.
Receive movaz_ssc_server packets.
Domain allowed access.
Do not audit attempts to receive movaz_ssc_server packets.
Domain allowed access.
Send and receive movaz_ssc_server packets.
Domain allowed access.
Do not audit attempts to send and receive movaz_ssc_server packets.
Domain to not audit.
Relabel packets to movaz_ssc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the mountd port.
Domain allowed access.
Send UDP traffic on the mountd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the mountd port.
Domain to not audit.
Receive UDP traffic on the mountd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the mountd port.
Domain to not audit.
Send and receive UDP traffic on the mountd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the mountd port.
Domain to not audit.
Bind TCP sockets to the mountd port.
Domain allowed access.
Bind UDP sockets to the mountd port.
Domain allowed access.
Make a TCP connection to the mountd port.
Domain allowed access.
Send mountd_client packets.
Domain allowed access.
Do not audit attempts to send mountd_client packets.
Domain to not audit.
Receive mountd_client packets.
Domain allowed access.
Do not audit attempts to receive mountd_client packets.
Domain allowed access.
Send and receive mountd_client packets.
Domain allowed access.
Do not audit attempts to send and receive mountd_client packets.
Domain to not audit.
Relabel packets to mountd_client the packet type.
Domain allowed access.
Send mountd_server packets.
Domain allowed access.
Do not audit attempts to send mountd_server packets.
Domain to not audit.
Receive mountd_server packets.
Domain allowed access.
Do not audit attempts to receive mountd_server packets.
Domain allowed access.
Send and receive mountd_server packets.
Domain allowed access.
Do not audit attempts to send and receive mountd_server packets.
Domain to not audit.
Relabel packets to mountd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the nessus port.
Domain allowed access.
Send UDP traffic on the nessus port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the nessus port.
Domain to not audit.
Receive UDP traffic on the nessus port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the nessus port.
Domain to not audit.
Send and receive UDP traffic on the nessus port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the nessus port.
Domain to not audit.
Bind TCP sockets to the nessus port.
Domain allowed access.
Bind UDP sockets to the nessus port.
Domain allowed access.
Make a TCP connection to the nessus port.
Domain allowed access.
Send nessus_client packets.
Domain allowed access.
Do not audit attempts to send nessus_client packets.
Domain to not audit.
Receive nessus_client packets.
Domain allowed access.
Do not audit attempts to receive nessus_client packets.
Domain allowed access.
Send and receive nessus_client packets.
Domain allowed access.
Do not audit attempts to send and receive nessus_client packets.
Domain to not audit.
Relabel packets to nessus_client the packet type.
Domain allowed access.
Send nessus_server packets.
Domain allowed access.
Do not audit attempts to send nessus_server packets.
Domain to not audit.
Receive nessus_server packets.
Domain allowed access.
Do not audit attempts to receive nessus_server packets.
Domain allowed access.
Send and receive nessus_server packets.
Domain allowed access.
Do not audit attempts to send and receive nessus_server packets.
Domain to not audit.
Relabel packets to nessus_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the netport port.
Domain allowed access.
Send UDP traffic on the netport port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the netport port.
Domain to not audit.
Receive UDP traffic on the netport port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the netport port.
Domain to not audit.
Send and receive UDP traffic on the netport port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the netport port.
Domain to not audit.
Bind TCP sockets to the netport port.
Domain allowed access.
Bind UDP sockets to the netport port.
Domain allowed access.
Make a TCP connection to the netport port.
Domain allowed access.
Send netport_client packets.
Domain allowed access.
Do not audit attempts to send netport_client packets.
Domain to not audit.
Receive netport_client packets.
Domain allowed access.
Do not audit attempts to receive netport_client packets.
Domain allowed access.
Send and receive netport_client packets.
Domain allowed access.
Do not audit attempts to send and receive netport_client packets.
Domain to not audit.
Relabel packets to netport_client the packet type.
Domain allowed access.
Send netport_server packets.
Domain allowed access.
Do not audit attempts to send netport_server packets.
Domain to not audit.
Receive netport_server packets.
Domain allowed access.
Do not audit attempts to receive netport_server packets.
Domain allowed access.
Send and receive netport_server packets.
Domain allowed access.
Do not audit attempts to send and receive netport_server packets.
Domain to not audit.
Relabel packets to netport_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the netsupport port.
Domain allowed access.
Send UDP traffic on the netsupport port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the netsupport port.
Domain to not audit.
Receive UDP traffic on the netsupport port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the netsupport port.
Domain to not audit.
Send and receive UDP traffic on the netsupport port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the netsupport port.
Domain to not audit.
Bind TCP sockets to the netsupport port.
Domain allowed access.
Bind UDP sockets to the netsupport port.
Domain allowed access.
Make a TCP connection to the netsupport port.
Domain allowed access.
Send netsupport_client packets.
Domain allowed access.
Do not audit attempts to send netsupport_client packets.
Domain to not audit.
Receive netsupport_client packets.
Domain allowed access.
Do not audit attempts to receive netsupport_client packets.
Domain allowed access.
Send and receive netsupport_client packets.
Domain allowed access.
Do not audit attempts to send and receive netsupport_client packets.
Domain to not audit.
Relabel packets to netsupport_client the packet type.
Domain allowed access.
Send netsupport_server packets.
Domain allowed access.
Do not audit attempts to send netsupport_server packets.
Domain to not audit.
Receive netsupport_server packets.
Domain allowed access.
Do not audit attempts to receive netsupport_server packets.
Domain allowed access.
Send and receive netsupport_server packets.
Domain allowed access.
Do not audit attempts to send and receive netsupport_server packets.
Domain to not audit.
Relabel packets to netsupport_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the nfs port.
Domain allowed access.
Send UDP traffic on the nfs port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the nfs port.
Domain to not audit.
Receive UDP traffic on the nfs port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the nfs port.
Domain to not audit.
Send and receive UDP traffic on the nfs port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the nfs port.
Domain to not audit.
Bind TCP sockets to the nfs port.
Domain allowed access.
Bind UDP sockets to the nfs port.
Domain allowed access.
Make a TCP connection to the nfs port.
Domain allowed access.
Send nfs_client packets.
Domain allowed access.
Do not audit attempts to send nfs_client packets.
Domain to not audit.
Receive nfs_client packets.
Domain allowed access.
Do not audit attempts to receive nfs_client packets.
Domain allowed access.
Send and receive nfs_client packets.
Domain allowed access.
Do not audit attempts to send and receive nfs_client packets.
Domain to not audit.
Relabel packets to nfs_client the packet type.
Domain allowed access.
Send nfs_server packets.
Domain allowed access.
Do not audit attempts to send nfs_server packets.
Domain to not audit.
Receive nfs_server packets.
Domain allowed access.
Do not audit attempts to receive nfs_server packets.
Domain allowed access.
Send and receive nfs_server packets.
Domain allowed access.
Do not audit attempts to send and receive nfs_server packets.
Domain to not audit.
Relabel packets to nfs_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the nmbd port.
Domain allowed access.
Send UDP traffic on the nmbd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the nmbd port.
Domain to not audit.
Receive UDP traffic on the nmbd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the nmbd port.
Domain to not audit.
Send and receive UDP traffic on the nmbd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the nmbd port.
Domain to not audit.
Bind TCP sockets to the nmbd port.
Domain allowed access.
Bind UDP sockets to the nmbd port.
Domain allowed access.
Make a TCP connection to the nmbd port.
Domain allowed access.
Send nmbd_client packets.
Domain allowed access.
Do not audit attempts to send nmbd_client packets.
Domain to not audit.
Receive nmbd_client packets.
Domain allowed access.
Do not audit attempts to receive nmbd_client packets.
Domain allowed access.
Send and receive nmbd_client packets.
Domain allowed access.
Do not audit attempts to send and receive nmbd_client packets.
Domain to not audit.
Relabel packets to nmbd_client the packet type.
Domain allowed access.
Send nmbd_server packets.
Domain allowed access.
Do not audit attempts to send nmbd_server packets.
Domain to not audit.
Receive nmbd_server packets.
Domain allowed access.
Do not audit attempts to receive nmbd_server packets.
Domain allowed access.
Send and receive nmbd_server packets.
Domain allowed access.
Do not audit attempts to send and receive nmbd_server packets.
Domain to not audit.
Relabel packets to nmbd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the nodejs_debug port.
Domain allowed access.
Send UDP traffic on the nodejs_debug port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the nodejs_debug port.
Domain to not audit.
Receive UDP traffic on the nodejs_debug port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the nodejs_debug port.
Domain to not audit.
Send and receive UDP traffic on the nodejs_debug port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the nodejs_debug port.
Domain to not audit.
Bind TCP sockets to the nodejs_debug port.
Domain allowed access.
Bind UDP sockets to the nodejs_debug port.
Domain allowed access.
Make a TCP connection to the nodejs_debug port.
Domain allowed access.
Send nodejs_debug_client packets.
Domain allowed access.
Do not audit attempts to send nodejs_debug_client packets.
Domain to not audit.
Receive nodejs_debug_client packets.
Domain allowed access.
Do not audit attempts to receive nodejs_debug_client packets.
Domain allowed access.
Send and receive nodejs_debug_client packets.
Domain allowed access.
Do not audit attempts to send and receive nodejs_debug_client packets.
Domain to not audit.
Relabel packets to nodejs_debug_client the packet type.
Domain allowed access.
Send nodejs_debug_server packets.
Domain allowed access.
Do not audit attempts to send nodejs_debug_server packets.
Domain to not audit.
Receive nodejs_debug_server packets.
Domain allowed access.
Do not audit attempts to receive nodejs_debug_server packets.
Domain allowed access.
Send and receive nodejs_debug_server packets.
Domain allowed access.
Do not audit attempts to send and receive nodejs_debug_server packets.
Domain to not audit.
Relabel packets to nodejs_debug_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ntp port.
Domain allowed access.
Send UDP traffic on the ntp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ntp port.
Domain to not audit.
Receive UDP traffic on the ntp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ntp port.
Domain to not audit.
Send and receive UDP traffic on the ntp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ntp port.
Domain to not audit.
Bind TCP sockets to the ntp port.
Domain allowed access.
Bind UDP sockets to the ntp port.
Domain allowed access.
Make a TCP connection to the ntp port.
Domain allowed access.
Send ntp_client packets.
Domain allowed access.
Do not audit attempts to send ntp_client packets.
Domain to not audit.
Receive ntp_client packets.
Domain allowed access.
Do not audit attempts to receive ntp_client packets.
Domain allowed access.
Send and receive ntp_client packets.
Domain allowed access.
Do not audit attempts to send and receive ntp_client packets.
Domain to not audit.
Relabel packets to ntp_client the packet type.
Domain allowed access.
Send ntp_server packets.
Domain allowed access.
Do not audit attempts to send ntp_server packets.
Domain to not audit.
Receive ntp_server packets.
Domain allowed access.
Do not audit attempts to receive ntp_server packets.
Domain allowed access.
Send and receive ntp_server packets.
Domain allowed access.
Do not audit attempts to send and receive ntp_server packets.
Domain to not audit.
Relabel packets to ntp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ntop port.
Domain allowed access.
Send UDP traffic on the ntop port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ntop port.
Domain to not audit.
Receive UDP traffic on the ntop port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ntop port.
Domain to not audit.
Send and receive UDP traffic on the ntop port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ntop port.
Domain to not audit.
Bind TCP sockets to the ntop port.
Domain allowed access.
Bind UDP sockets to the ntop port.
Domain allowed access.
Make a TCP connection to the ntop port.
Domain allowed access.
Send ntop_client packets.
Domain allowed access.
Do not audit attempts to send ntop_client packets.
Domain to not audit.
Receive ntop_client packets.
Domain allowed access.
Do not audit attempts to receive ntop_client packets.
Domain allowed access.
Send and receive ntop_client packets.
Domain allowed access.
Do not audit attempts to send and receive ntop_client packets.
Domain to not audit.
Relabel packets to ntop_client the packet type.
Domain allowed access.
Send ntop_server packets.
Domain allowed access.
Do not audit attempts to send ntop_server packets.
Domain to not audit.
Receive ntop_server packets.
Domain allowed access.
Do not audit attempts to receive ntop_server packets.
Domain allowed access.
Send and receive ntop_server packets.
Domain allowed access.
Do not audit attempts to send and receive ntop_server packets.
Domain to not audit.
Relabel packets to ntop_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the oracle port.
Domain allowed access.
Send UDP traffic on the oracle port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the oracle port.
Domain to not audit.
Receive UDP traffic on the oracle port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the oracle port.
Domain to not audit.
Send and receive UDP traffic on the oracle port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the oracle port.
Domain to not audit.
Bind TCP sockets to the oracle port.
Domain allowed access.
Bind UDP sockets to the oracle port.
Domain allowed access.
Make a TCP connection to the oracle port.
Domain allowed access.
Send oracle_client packets.
Domain allowed access.
Do not audit attempts to send oracle_client packets.
Domain to not audit.
Receive oracle_client packets.
Domain allowed access.
Do not audit attempts to receive oracle_client packets.
Domain allowed access.
Send and receive oracle_client packets.
Domain allowed access.
Do not audit attempts to send and receive oracle_client packets.
Domain to not audit.
Relabel packets to oracle_client the packet type.
Domain allowed access.
Send oracle_server packets.
Domain allowed access.
Do not audit attempts to send oracle_server packets.
Domain to not audit.
Receive oracle_server packets.
Domain allowed access.
Do not audit attempts to receive oracle_server packets.
Domain allowed access.
Send and receive oracle_server packets.
Domain allowed access.
Do not audit attempts to send and receive oracle_server packets.
Domain to not audit.
Relabel packets to oracle_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ocsp port.
Domain allowed access.
Send UDP traffic on the ocsp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ocsp port.
Domain to not audit.
Receive UDP traffic on the ocsp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ocsp port.
Domain to not audit.
Send and receive UDP traffic on the ocsp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ocsp port.
Domain to not audit.
Bind TCP sockets to the ocsp port.
Domain allowed access.
Bind UDP sockets to the ocsp port.
Domain allowed access.
Make a TCP connection to the ocsp port.
Domain allowed access.
Send ocsp_client packets.
Domain allowed access.
Do not audit attempts to send ocsp_client packets.
Domain to not audit.
Receive ocsp_client packets.
Domain allowed access.
Do not audit attempts to receive ocsp_client packets.
Domain allowed access.
Send and receive ocsp_client packets.
Domain allowed access.
Do not audit attempts to send and receive ocsp_client packets.
Domain to not audit.
Relabel packets to ocsp_client the packet type.
Domain allowed access.
Send ocsp_server packets.
Domain allowed access.
Do not audit attempts to send ocsp_server packets.
Domain to not audit.
Receive ocsp_server packets.
Domain allowed access.
Do not audit attempts to receive ocsp_server packets.
Domain allowed access.
Send and receive ocsp_server packets.
Domain allowed access.
Do not audit attempts to send and receive ocsp_server packets.
Domain to not audit.
Relabel packets to ocsp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the openhpid port.
Domain allowed access.
Send UDP traffic on the openhpid port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the openhpid port.
Domain to not audit.
Receive UDP traffic on the openhpid port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the openhpid port.
Domain to not audit.
Send and receive UDP traffic on the openhpid port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the openhpid port.
Domain to not audit.
Bind TCP sockets to the openhpid port.
Domain allowed access.
Bind UDP sockets to the openhpid port.
Domain allowed access.
Make a TCP connection to the openhpid port.
Domain allowed access.
Send openhpid_client packets.
Domain allowed access.
Do not audit attempts to send openhpid_client packets.
Domain to not audit.
Receive openhpid_client packets.
Domain allowed access.
Do not audit attempts to receive openhpid_client packets.
Domain allowed access.
Send and receive openhpid_client packets.
Domain allowed access.
Do not audit attempts to send and receive openhpid_client packets.
Domain to not audit.
Relabel packets to openhpid_client the packet type.
Domain allowed access.
Send openhpid_server packets.
Domain allowed access.
Do not audit attempts to send openhpid_server packets.
Domain to not audit.
Receive openhpid_server packets.
Domain allowed access.
Do not audit attempts to receive openhpid_server packets.
Domain allowed access.
Send and receive openhpid_server packets.
Domain allowed access.
Do not audit attempts to send and receive openhpid_server packets.
Domain to not audit.
Relabel packets to openhpid_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the openvpn port.
Domain allowed access.
Send UDP traffic on the openvpn port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the openvpn port.
Domain to not audit.
Receive UDP traffic on the openvpn port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the openvpn port.
Domain to not audit.
Send and receive UDP traffic on the openvpn port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the openvpn port.
Domain to not audit.
Bind TCP sockets to the openvpn port.
Domain allowed access.
Bind UDP sockets to the openvpn port.
Domain allowed access.
Make a TCP connection to the openvpn port.
Domain allowed access.
Send openvpn_client packets.
Domain allowed access.
Do not audit attempts to send openvpn_client packets.
Domain to not audit.
Receive openvpn_client packets.
Domain allowed access.
Do not audit attempts to receive openvpn_client packets.
Domain allowed access.
Send and receive openvpn_client packets.
Domain allowed access.
Do not audit attempts to send and receive openvpn_client packets.
Domain to not audit.
Relabel packets to openvpn_client the packet type.
Domain allowed access.
Send openvpn_server packets.
Domain allowed access.
Do not audit attempts to send openvpn_server packets.
Domain to not audit.
Receive openvpn_server packets.
Domain allowed access.
Do not audit attempts to receive openvpn_server packets.
Domain allowed access.
Send and receive openvpn_server packets.
Domain allowed access.
Do not audit attempts to send and receive openvpn_server packets.
Domain to not audit.
Relabel packets to openvpn_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pktcable port.
Domain allowed access.
Send UDP traffic on the pktcable port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pktcable port.
Domain to not audit.
Receive UDP traffic on the pktcable port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pktcable port.
Domain to not audit.
Send and receive UDP traffic on the pktcable port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pktcable port.
Domain to not audit.
Bind TCP sockets to the pktcable port.
Domain allowed access.
Bind UDP sockets to the pktcable port.
Domain allowed access.
Make a TCP connection to the pktcable port.
Domain allowed access.
Send pktcable_client packets.
Domain allowed access.
Do not audit attempts to send pktcable_client packets.
Domain to not audit.
Receive pktcable_client packets.
Domain allowed access.
Do not audit attempts to receive pktcable_client packets.
Domain allowed access.
Send and receive pktcable_client packets.
Domain allowed access.
Do not audit attempts to send and receive pktcable_client packets.
Domain to not audit.
Relabel packets to pktcable_client the packet type.
Domain allowed access.
Send pktcable_server packets.
Domain allowed access.
Do not audit attempts to send pktcable_server packets.
Domain to not audit.
Receive pktcable_server packets.
Domain allowed access.
Do not audit attempts to receive pktcable_server packets.
Domain allowed access.
Send and receive pktcable_server packets.
Domain allowed access.
Do not audit attempts to send and receive pktcable_server packets.
Domain to not audit.
Relabel packets to pktcable_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pegasus_http port.
Domain allowed access.
Send UDP traffic on the pegasus_http port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pegasus_http port.
Domain to not audit.
Receive UDP traffic on the pegasus_http port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pegasus_http port.
Domain to not audit.
Send and receive UDP traffic on the pegasus_http port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pegasus_http port.
Domain to not audit.
Bind TCP sockets to the pegasus_http port.
Domain allowed access.
Bind UDP sockets to the pegasus_http port.
Domain allowed access.
Make a TCP connection to the pegasus_http port.
Domain allowed access.
Send pegasus_http_client packets.
Domain allowed access.
Do not audit attempts to send pegasus_http_client packets.
Domain to not audit.
Receive pegasus_http_client packets.
Domain allowed access.
Do not audit attempts to receive pegasus_http_client packets.
Domain allowed access.
Send and receive pegasus_http_client packets.
Domain allowed access.
Do not audit attempts to send and receive pegasus_http_client packets.
Domain to not audit.
Relabel packets to pegasus_http_client the packet type.
Domain allowed access.
Send pegasus_http_server packets.
Domain allowed access.
Do not audit attempts to send pegasus_http_server packets.
Domain to not audit.
Receive pegasus_http_server packets.
Domain allowed access.
Do not audit attempts to receive pegasus_http_server packets.
Domain allowed access.
Send and receive pegasus_http_server packets.
Domain allowed access.
Do not audit attempts to send and receive pegasus_http_server packets.
Domain to not audit.
Relabel packets to pegasus_http_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pegasus_https port.
Domain allowed access.
Send UDP traffic on the pegasus_https port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pegasus_https port.
Domain to not audit.
Receive UDP traffic on the pegasus_https port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pegasus_https port.
Domain to not audit.
Send and receive UDP traffic on the pegasus_https port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pegasus_https port.
Domain to not audit.
Bind TCP sockets to the pegasus_https port.
Domain allowed access.
Bind UDP sockets to the pegasus_https port.
Domain allowed access.
Make a TCP connection to the pegasus_https port.
Domain allowed access.
Send pegasus_https_client packets.
Domain allowed access.
Do not audit attempts to send pegasus_https_client packets.
Domain to not audit.
Receive pegasus_https_client packets.
Domain allowed access.
Do not audit attempts to receive pegasus_https_client packets.
Domain allowed access.
Send and receive pegasus_https_client packets.
Domain allowed access.
Do not audit attempts to send and receive pegasus_https_client packets.
Domain to not audit.
Relabel packets to pegasus_https_client the packet type.
Domain allowed access.
Send pegasus_https_server packets.
Domain allowed access.
Do not audit attempts to send pegasus_https_server packets.
Domain to not audit.
Receive pegasus_https_server packets.
Domain allowed access.
Do not audit attempts to receive pegasus_https_server packets.
Domain allowed access.
Send and receive pegasus_https_server packets.
Domain allowed access.
Do not audit attempts to send and receive pegasus_https_server packets.
Domain to not audit.
Relabel packets to pegasus_https_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pgpkeyserver port.
Domain allowed access.
Send UDP traffic on the pgpkeyserver port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pgpkeyserver port.
Domain to not audit.
Receive UDP traffic on the pgpkeyserver port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
Domain to not audit.
Send and receive UDP traffic on the pgpkeyserver port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pgpkeyserver port.
Domain to not audit.
Bind TCP sockets to the pgpkeyserver port.
Domain allowed access.
Bind UDP sockets to the pgpkeyserver port.
Domain allowed access.
Make a TCP connection to the pgpkeyserver port.
Domain allowed access.
Send pgpkeyserver_client packets.
Domain allowed access.
Do not audit attempts to send pgpkeyserver_client packets.
Domain to not audit.
Receive pgpkeyserver_client packets.
Domain allowed access.
Do not audit attempts to receive pgpkeyserver_client packets.
Domain allowed access.
Send and receive pgpkeyserver_client packets.
Domain allowed access.
Do not audit attempts to send and receive pgpkeyserver_client packets.
Domain to not audit.
Relabel packets to pgpkeyserver_client the packet type.
Domain allowed access.
Send pgpkeyserver_server packets.
Domain allowed access.
Do not audit attempts to send pgpkeyserver_server packets.
Domain to not audit.
Receive pgpkeyserver_server packets.
Domain allowed access.
Do not audit attempts to receive pgpkeyserver_server packets.
Domain allowed access.
Send and receive pgpkeyserver_server packets.
Domain allowed access.
Do not audit attempts to send and receive pgpkeyserver_server packets.
Domain to not audit.
Relabel packets to pgpkeyserver_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pingd port.
Domain allowed access.
Send UDP traffic on the pingd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pingd port.
Domain to not audit.
Receive UDP traffic on the pingd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pingd port.
Domain to not audit.
Send and receive UDP traffic on the pingd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pingd port.
Domain to not audit.
Bind TCP sockets to the pingd port.
Domain allowed access.
Bind UDP sockets to the pingd port.
Domain allowed access.
Make a TCP connection to the pingd port.
Domain allowed access.
Send pingd_client packets.
Domain allowed access.
Do not audit attempts to send pingd_client packets.
Domain to not audit.
Receive pingd_client packets.
Domain allowed access.
Do not audit attempts to receive pingd_client packets.
Domain allowed access.
Send and receive pingd_client packets.
Domain allowed access.
Do not audit attempts to send and receive pingd_client packets.
Domain to not audit.
Relabel packets to pingd_client the packet type.
Domain allowed access.
Send pingd_server packets.
Domain allowed access.
Do not audit attempts to send pingd_server packets.
Domain to not audit.
Receive pingd_server packets.
Domain allowed access.
Do not audit attempts to receive pingd_server packets.
Domain allowed access.
Send and receive pingd_server packets.
Domain allowed access.
Do not audit attempts to send and receive pingd_server packets.
Domain to not audit.
Relabel packets to pingd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the piranha port.
Domain allowed access.
Send UDP traffic on the piranha port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the piranha port.
Domain to not audit.
Receive UDP traffic on the piranha port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the piranha port.
Domain to not audit.
Send and receive UDP traffic on the piranha port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the piranha port.
Domain to not audit.
Bind TCP sockets to the piranha port.
Domain allowed access.
Bind UDP sockets to the piranha port.
Domain allowed access.
Make a TCP connection to the piranha port.
Domain allowed access.
Send piranha_client packets.
Domain allowed access.
Do not audit attempts to send piranha_client packets.
Domain to not audit.
Receive piranha_client packets.
Domain allowed access.
Do not audit attempts to receive piranha_client packets.
Domain allowed access.
Send and receive piranha_client packets.
Domain allowed access.
Do not audit attempts to send and receive piranha_client packets.
Domain to not audit.
Relabel packets to piranha_client the packet type.
Domain allowed access.
Send piranha_server packets.
Domain allowed access.
Do not audit attempts to send piranha_server packets.
Domain to not audit.
Receive piranha_server packets.
Domain allowed access.
Do not audit attempts to receive piranha_server packets.
Domain allowed access.
Send and receive piranha_server packets.
Domain allowed access.
Do not audit attempts to send and receive piranha_server packets.
Domain to not audit.
Relabel packets to piranha_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_ca port.
Domain allowed access.
Send UDP traffic on the pki_ca port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_ca port.
Domain to not audit.
Receive UDP traffic on the pki_ca port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_ca port.
Domain to not audit.
Send and receive UDP traffic on the pki_ca port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_ca port.
Domain to not audit.
Bind TCP sockets to the pki_ca port.
Domain allowed access.
Bind UDP sockets to the pki_ca port.
Domain allowed access.
Make a TCP connection to the pki_ca port.
Domain allowed access.
Send pki_ca_client packets.
Domain allowed access.
Do not audit attempts to send pki_ca_client packets.
Domain to not audit.
Receive pki_ca_client packets.
Domain allowed access.
Do not audit attempts to receive pki_ca_client packets.
Domain allowed access.
Send and receive pki_ca_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ca_client packets.
Domain to not audit.
Relabel packets to pki_ca_client the packet type.
Domain allowed access.
Send pki_ca_server packets.
Domain allowed access.
Do not audit attempts to send pki_ca_server packets.
Domain to not audit.
Receive pki_ca_server packets.
Domain allowed access.
Do not audit attempts to receive pki_ca_server packets.
Domain allowed access.
Send and receive pki_ca_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ca_server packets.
Domain to not audit.
Relabel packets to pki_ca_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_kra port.
Domain allowed access.
Send UDP traffic on the pki_kra port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_kra port.
Domain to not audit.
Receive UDP traffic on the pki_kra port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_kra port.
Domain to not audit.
Send and receive UDP traffic on the pki_kra port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_kra port.
Domain to not audit.
Bind TCP sockets to the pki_kra port.
Domain allowed access.
Bind UDP sockets to the pki_kra port.
Domain allowed access.
Make a TCP connection to the pki_kra port.
Domain allowed access.
Send pki_kra_client packets.
Domain allowed access.
Do not audit attempts to send pki_kra_client packets.
Domain to not audit.
Receive pki_kra_client packets.
Domain allowed access.
Do not audit attempts to receive pki_kra_client packets.
Domain allowed access.
Send and receive pki_kra_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_kra_client packets.
Domain to not audit.
Relabel packets to pki_kra_client the packet type.
Domain allowed access.
Send pki_kra_server packets.
Domain allowed access.
Do not audit attempts to send pki_kra_server packets.
Domain to not audit.
Receive pki_kra_server packets.
Domain allowed access.
Do not audit attempts to receive pki_kra_server packets.
Domain allowed access.
Send and receive pki_kra_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_kra_server packets.
Domain to not audit.
Relabel packets to pki_kra_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_ocsp port.
Domain allowed access.
Send UDP traffic on the pki_ocsp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_ocsp port.
Domain to not audit.
Receive UDP traffic on the pki_ocsp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_ocsp port.
Domain to not audit.
Send and receive UDP traffic on the pki_ocsp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_ocsp port.
Domain to not audit.
Bind TCP sockets to the pki_ocsp port.
Domain allowed access.
Bind UDP sockets to the pki_ocsp port.
Domain allowed access.
Make a TCP connection to the pki_ocsp port.
Domain allowed access.
Send pki_ocsp_client packets.
Domain allowed access.
Do not audit attempts to send pki_ocsp_client packets.
Domain to not audit.
Receive pki_ocsp_client packets.
Domain allowed access.
Do not audit attempts to receive pki_ocsp_client packets.
Domain allowed access.
Send and receive pki_ocsp_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ocsp_client packets.
Domain to not audit.
Relabel packets to pki_ocsp_client the packet type.
Domain allowed access.
Send pki_ocsp_server packets.
Domain allowed access.
Do not audit attempts to send pki_ocsp_server packets.
Domain to not audit.
Receive pki_ocsp_server packets.
Domain allowed access.
Do not audit attempts to receive pki_ocsp_server packets.
Domain allowed access.
Send and receive pki_ocsp_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ocsp_server packets.
Domain to not audit.
Relabel packets to pki_ocsp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_tks port.
Domain allowed access.
Send UDP traffic on the pki_tks port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_tks port.
Domain to not audit.
Receive UDP traffic on the pki_tks port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_tks port.
Domain to not audit.
Send and receive UDP traffic on the pki_tks port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_tks port.
Domain to not audit.
Bind TCP sockets to the pki_tks port.
Domain allowed access.
Bind UDP sockets to the pki_tks port.
Domain allowed access.
Make a TCP connection to the pki_tks port.
Domain allowed access.
Send pki_tks_client packets.
Domain allowed access.
Do not audit attempts to send pki_tks_client packets.
Domain to not audit.
Receive pki_tks_client packets.
Domain allowed access.
Do not audit attempts to receive pki_tks_client packets.
Domain allowed access.
Send and receive pki_tks_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_tks_client packets.
Domain to not audit.
Relabel packets to pki_tks_client the packet type.
Domain allowed access.
Send pki_tks_server packets.
Domain allowed access.
Do not audit attempts to send pki_tks_server packets.
Domain to not audit.
Receive pki_tks_server packets.
Domain allowed access.
Do not audit attempts to receive pki_tks_server packets.
Domain allowed access.
Send and receive pki_tks_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_tks_server packets.
Domain to not audit.
Relabel packets to pki_tks_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_ra port.
Domain allowed access.
Send UDP traffic on the pki_ra port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_ra port.
Domain to not audit.
Receive UDP traffic on the pki_ra port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_ra port.
Domain to not audit.
Send and receive UDP traffic on the pki_ra port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_ra port.
Domain to not audit.
Bind TCP sockets to the pki_ra port.
Domain allowed access.
Bind UDP sockets to the pki_ra port.
Domain allowed access.
Make a TCP connection to the pki_ra port.
Domain allowed access.
Send pki_ra_client packets.
Domain allowed access.
Do not audit attempts to send pki_ra_client packets.
Domain to not audit.
Receive pki_ra_client packets.
Domain allowed access.
Do not audit attempts to receive pki_ra_client packets.
Domain allowed access.
Send and receive pki_ra_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ra_client packets.
Domain to not audit.
Relabel packets to pki_ra_client the packet type.
Domain allowed access.
Send pki_ra_server packets.
Domain allowed access.
Do not audit attempts to send pki_ra_server packets.
Domain to not audit.
Receive pki_ra_server packets.
Domain allowed access.
Do not audit attempts to receive pki_ra_server packets.
Domain allowed access.
Send and receive pki_ra_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_ra_server packets.
Domain to not audit.
Relabel packets to pki_ra_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pki_tps port.
Domain allowed access.
Send UDP traffic on the pki_tps port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pki_tps port.
Domain to not audit.
Receive UDP traffic on the pki_tps port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pki_tps port.
Domain to not audit.
Send and receive UDP traffic on the pki_tps port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pki_tps port.
Domain to not audit.
Bind TCP sockets to the pki_tps port.
Domain allowed access.
Bind UDP sockets to the pki_tps port.
Domain allowed access.
Make a TCP connection to the pki_tps port.
Domain allowed access.
Send pki_tps_client packets.
Domain allowed access.
Do not audit attempts to send pki_tps_client packets.
Domain to not audit.
Receive pki_tps_client packets.
Domain allowed access.
Do not audit attempts to receive pki_tps_client packets.
Domain allowed access.
Send and receive pki_tps_client packets.
Domain allowed access.
Do not audit attempts to send and receive pki_tps_client packets.
Domain to not audit.
Relabel packets to pki_tps_client the packet type.
Domain allowed access.
Send pki_tps_server packets.
Domain allowed access.
Do not audit attempts to send pki_tps_server packets.
Domain to not audit.
Receive pki_tps_server packets.
Domain allowed access.
Do not audit attempts to receive pki_tps_server packets.
Domain allowed access.
Send and receive pki_tps_server packets.
Domain allowed access.
Do not audit attempts to send and receive pki_tps_server packets.
Domain to not audit.
Relabel packets to pki_tps_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pop port.
Domain allowed access.
Send UDP traffic on the pop port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pop port.
Domain to not audit.
Receive UDP traffic on the pop port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pop port.
Domain to not audit.
Send and receive UDP traffic on the pop port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pop port.
Domain to not audit.
Bind TCP sockets to the pop port.
Domain allowed access.
Bind UDP sockets to the pop port.
Domain allowed access.
Make a TCP connection to the pop port.
Domain allowed access.
Send pop_client packets.
Domain allowed access.
Do not audit attempts to send pop_client packets.
Domain to not audit.
Receive pop_client packets.
Domain allowed access.
Do not audit attempts to receive pop_client packets.
Domain allowed access.
Send and receive pop_client packets.
Domain allowed access.
Do not audit attempts to send and receive pop_client packets.
Domain to not audit.
Relabel packets to pop_client the packet type.
Domain allowed access.
Send pop_server packets.
Domain allowed access.
Do not audit attempts to send pop_server packets.
Domain to not audit.
Receive pop_server packets.
Domain allowed access.
Do not audit attempts to receive pop_server packets.
Domain allowed access.
Send and receive pop_server packets.
Domain allowed access.
Do not audit attempts to send and receive pop_server packets.
Domain to not audit.
Relabel packets to pop_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the portmap port.
Domain allowed access.
Send UDP traffic on the portmap port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the portmap port.
Domain to not audit.
Receive UDP traffic on the portmap port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the portmap port.
Domain to not audit.
Send and receive UDP traffic on the portmap port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the portmap port.
Domain to not audit.
Bind TCP sockets to the portmap port.
Domain allowed access.
Bind UDP sockets to the portmap port.
Domain allowed access.
Make a TCP connection to the portmap port.
Domain allowed access.
Send portmap_client packets.
Domain allowed access.
Do not audit attempts to send portmap_client packets.
Domain to not audit.
Receive portmap_client packets.
Domain allowed access.
Do not audit attempts to receive portmap_client packets.
Domain allowed access.
Send and receive portmap_client packets.
Domain allowed access.
Do not audit attempts to send and receive portmap_client packets.
Domain to not audit.
Relabel packets to portmap_client the packet type.
Domain allowed access.
Send portmap_server packets.
Domain allowed access.
Do not audit attempts to send portmap_server packets.
Domain to not audit.
Receive portmap_server packets.
Domain allowed access.
Do not audit attempts to receive portmap_server packets.
Domain allowed access.
Send and receive portmap_server packets.
Domain allowed access.
Do not audit attempts to send and receive portmap_server packets.
Domain to not audit.
Relabel packets to portmap_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the postfix_policyd port.
Domain allowed access.
Send UDP traffic on the postfix_policyd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the postfix_policyd port.
Domain to not audit.
Receive UDP traffic on the postfix_policyd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the postfix_policyd port.
Domain to not audit.
Send and receive UDP traffic on the postfix_policyd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the postfix_policyd port.
Domain to not audit.
Bind TCP sockets to the postfix_policyd port.
Domain allowed access.
Bind UDP sockets to the postfix_policyd port.
Domain allowed access.
Make a TCP connection to the postfix_policyd port.
Domain allowed access.
Send postfix_policyd_client packets.
Domain allowed access.
Do not audit attempts to send postfix_policyd_client packets.
Domain to not audit.
Receive postfix_policyd_client packets.
Domain allowed access.
Do not audit attempts to receive postfix_policyd_client packets.
Domain allowed access.
Send and receive postfix_policyd_client packets.
Domain allowed access.
Do not audit attempts to send and receive postfix_policyd_client packets.
Domain to not audit.
Relabel packets to postfix_policyd_client the packet type.
Domain allowed access.
Send postfix_policyd_server packets.
Domain allowed access.
Do not audit attempts to send postfix_policyd_server packets.
Domain to not audit.
Receive postfix_policyd_server packets.
Domain allowed access.
Do not audit attempts to receive postfix_policyd_server packets.
Domain allowed access.
Send and receive postfix_policyd_server packets.
Domain allowed access.
Do not audit attempts to send and receive postfix_policyd_server packets.
Domain to not audit.
Relabel packets to postfix_policyd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the postgresql port.
Domain allowed access.
Send UDP traffic on the postgresql port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the postgresql port.
Domain to not audit.
Receive UDP traffic on the postgresql port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the postgresql port.
Domain to not audit.
Send and receive UDP traffic on the postgresql port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the postgresql port.
Domain to not audit.
Bind TCP sockets to the postgresql port.
Domain allowed access.
Bind UDP sockets to the postgresql port.
Domain allowed access.
Make a TCP connection to the postgresql port.
Domain allowed access.
Send postgresql_client packets.
Domain allowed access.
Do not audit attempts to send postgresql_client packets.
Domain to not audit.
Receive postgresql_client packets.
Domain allowed access.
Do not audit attempts to receive postgresql_client packets.
Domain allowed access.
Send and receive postgresql_client packets.
Domain allowed access.
Do not audit attempts to send and receive postgresql_client packets.
Domain to not audit.
Relabel packets to postgresql_client the packet type.
Domain allowed access.
Send postgresql_server packets.
Domain allowed access.
Do not audit attempts to send postgresql_server packets.
Domain to not audit.
Receive postgresql_server packets.
Domain allowed access.
Do not audit attempts to receive postgresql_server packets.
Domain allowed access.
Send and receive postgresql_server packets.
Domain allowed access.
Do not audit attempts to send and receive postgresql_server packets.
Domain to not audit.
Relabel packets to postgresql_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the postgrey port.
Domain allowed access.
Send UDP traffic on the postgrey port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the postgrey port.
Domain to not audit.
Receive UDP traffic on the postgrey port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the postgrey port.
Domain to not audit.
Send and receive UDP traffic on the postgrey port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the postgrey port.
Domain to not audit.
Bind TCP sockets to the postgrey port.
Domain allowed access.
Bind UDP sockets to the postgrey port.
Domain allowed access.
Make a TCP connection to the postgrey port.
Domain allowed access.
Send postgrey_client packets.
Domain allowed access.
Do not audit attempts to send postgrey_client packets.
Domain to not audit.
Receive postgrey_client packets.
Domain allowed access.
Do not audit attempts to receive postgrey_client packets.
Domain allowed access.
Send and receive postgrey_client packets.
Domain allowed access.
Do not audit attempts to send and receive postgrey_client packets.
Domain to not audit.
Relabel packets to postgrey_client the packet type.
Domain allowed access.
Send postgrey_server packets.
Domain allowed access.
Do not audit attempts to send postgrey_server packets.
Domain to not audit.
Receive postgrey_server packets.
Domain allowed access.
Do not audit attempts to receive postgrey_server packets.
Domain allowed access.
Send and receive postgrey_server packets.
Domain allowed access.
Do not audit attempts to send and receive postgrey_server packets.
Domain to not audit.
Relabel packets to postgrey_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the prelude port.
Domain allowed access.
Send UDP traffic on the prelude port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the prelude port.
Domain to not audit.
Receive UDP traffic on the prelude port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the prelude port.
Domain to not audit.
Send and receive UDP traffic on the prelude port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the prelude port.
Domain to not audit.
Bind TCP sockets to the prelude port.
Domain allowed access.
Bind UDP sockets to the prelude port.
Domain allowed access.
Make a TCP connection to the prelude port.
Domain allowed access.
Send prelude_client packets.
Domain allowed access.
Do not audit attempts to send prelude_client packets.
Domain to not audit.
Receive prelude_client packets.
Domain allowed access.
Do not audit attempts to receive prelude_client packets.
Domain allowed access.
Send and receive prelude_client packets.
Domain allowed access.
Do not audit attempts to send and receive prelude_client packets.
Domain to not audit.
Relabel packets to prelude_client the packet type.
Domain allowed access.
Send prelude_server packets.
Domain allowed access.
Do not audit attempts to send prelude_server packets.
Domain to not audit.
Receive prelude_server packets.
Domain allowed access.
Do not audit attempts to receive prelude_server packets.
Domain allowed access.
Send and receive prelude_server packets.
Domain allowed access.
Do not audit attempts to send and receive prelude_server packets.
Domain to not audit.
Relabel packets to prelude_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the presence port.
Domain allowed access.
Send UDP traffic on the presence port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the presence port.
Domain to not audit.
Receive UDP traffic on the presence port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the presence port.
Domain to not audit.
Send and receive UDP traffic on the presence port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the presence port.
Domain to not audit.
Bind TCP sockets to the presence port.
Domain allowed access.
Bind UDP sockets to the presence port.
Domain allowed access.
Make a TCP connection to the presence port.
Domain allowed access.
Send presence_client packets.
Domain allowed access.
Do not audit attempts to send presence_client packets.
Domain to not audit.
Receive presence_client packets.
Domain allowed access.
Do not audit attempts to receive presence_client packets.
Domain allowed access.
Send and receive presence_client packets.
Domain allowed access.
Do not audit attempts to send and receive presence_client packets.
Domain to not audit.
Relabel packets to presence_client the packet type.
Domain allowed access.
Send presence_server packets.
Domain allowed access.
Do not audit attempts to send presence_server packets.
Domain to not audit.
Receive presence_server packets.
Domain allowed access.
Do not audit attempts to receive presence_server packets.
Domain allowed access.
Send and receive presence_server packets.
Domain allowed access.
Do not audit attempts to send and receive presence_server packets.
Domain to not audit.
Relabel packets to presence_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the preupgrade port.
Domain allowed access.
Send UDP traffic on the preupgrade port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the preupgrade port.
Domain to not audit.
Receive UDP traffic on the preupgrade port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the preupgrade port.
Domain to not audit.
Send and receive UDP traffic on the preupgrade port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the preupgrade port.
Domain to not audit.
Bind TCP sockets to the preupgrade port.
Domain allowed access.
Bind UDP sockets to the preupgrade port.
Domain allowed access.
Make a TCP connection to the preupgrade port.
Domain allowed access.
Send preupgrade_client packets.
Domain allowed access.
Do not audit attempts to send preupgrade_client packets.
Domain to not audit.
Receive preupgrade_client packets.
Domain allowed access.
Do not audit attempts to receive preupgrade_client packets.
Domain allowed access.
Send and receive preupgrade_client packets.
Domain allowed access.
Do not audit attempts to send and receive preupgrade_client packets.
Domain to not audit.
Relabel packets to preupgrade_client the packet type.
Domain allowed access.
Send preupgrade_server packets.
Domain allowed access.
Do not audit attempts to send preupgrade_server packets.
Domain to not audit.
Receive preupgrade_server packets.
Domain allowed access.
Do not audit attempts to receive preupgrade_server packets.
Domain allowed access.
Send and receive preupgrade_server packets.
Domain allowed access.
Do not audit attempts to send and receive preupgrade_server packets.
Domain to not audit.
Relabel packets to preupgrade_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the printer port.
Domain allowed access.
Send UDP traffic on the printer port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the printer port.
Domain to not audit.
Receive UDP traffic on the printer port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the printer port.
Domain to not audit.
Send and receive UDP traffic on the printer port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the printer port.
Domain to not audit.
Bind TCP sockets to the printer port.
Domain allowed access.
Bind UDP sockets to the printer port.
Domain allowed access.
Make a TCP connection to the printer port.
Domain allowed access.
Send printer_client packets.
Domain allowed access.
Do not audit attempts to send printer_client packets.
Domain to not audit.
Receive printer_client packets.
Domain allowed access.
Do not audit attempts to receive printer_client packets.
Domain allowed access.
Send and receive printer_client packets.
Domain allowed access.
Do not audit attempts to send and receive printer_client packets.
Domain to not audit.
Relabel packets to printer_client the packet type.
Domain allowed access.
Send printer_server packets.
Domain allowed access.
Do not audit attempts to send printer_server packets.
Domain to not audit.
Receive printer_server packets.
Domain allowed access.
Do not audit attempts to receive printer_server packets.
Domain allowed access.
Send and receive printer_server packets.
Domain allowed access.
Do not audit attempts to send and receive printer_server packets.
Domain to not audit.
Relabel packets to printer_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ptal port.
Domain allowed access.
Send UDP traffic on the ptal port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ptal port.
Domain to not audit.
Receive UDP traffic on the ptal port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ptal port.
Domain to not audit.
Send and receive UDP traffic on the ptal port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ptal port.
Domain to not audit.
Bind TCP sockets to the ptal port.
Domain allowed access.
Bind UDP sockets to the ptal port.
Domain allowed access.
Make a TCP connection to the ptal port.
Domain allowed access.
Send ptal_client packets.
Domain allowed access.
Do not audit attempts to send ptal_client packets.
Domain to not audit.
Receive ptal_client packets.
Domain allowed access.
Do not audit attempts to receive ptal_client packets.
Domain allowed access.
Send and receive ptal_client packets.
Domain allowed access.
Do not audit attempts to send and receive ptal_client packets.
Domain to not audit.
Relabel packets to ptal_client the packet type.
Domain allowed access.
Send ptal_server packets.
Domain allowed access.
Do not audit attempts to send ptal_server packets.
Domain to not audit.
Receive ptal_server packets.
Domain allowed access.
Do not audit attempts to receive ptal_server packets.
Domain allowed access.
Send and receive ptal_server packets.
Domain allowed access.
Do not audit attempts to send and receive ptal_server packets.
Domain to not audit.
Relabel packets to ptal_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pulseaudio port.
Domain allowed access.
Send UDP traffic on the pulseaudio port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pulseaudio port.
Domain to not audit.
Receive UDP traffic on the pulseaudio port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pulseaudio port.
Domain to not audit.
Send and receive UDP traffic on the pulseaudio port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pulseaudio port.
Domain to not audit.
Bind TCP sockets to the pulseaudio port.
Domain allowed access.
Bind UDP sockets to the pulseaudio port.
Domain allowed access.
Make a TCP connection to the pulseaudio port.
Domain allowed access.
Send pulseaudio_client packets.
Domain allowed access.
Do not audit attempts to send pulseaudio_client packets.
Domain to not audit.
Receive pulseaudio_client packets.
Domain allowed access.
Do not audit attempts to receive pulseaudio_client packets.
Domain allowed access.
Send and receive pulseaudio_client packets.
Domain allowed access.
Do not audit attempts to send and receive pulseaudio_client packets.
Domain to not audit.
Relabel packets to pulseaudio_client the packet type.
Domain allowed access.
Send pulseaudio_server packets.
Domain allowed access.
Do not audit attempts to send pulseaudio_server packets.
Domain to not audit.
Receive pulseaudio_server packets.
Domain allowed access.
Do not audit attempts to receive pulseaudio_server packets.
Domain allowed access.
Send and receive pulseaudio_server packets.
Domain allowed access.
Do not audit attempts to send and receive pulseaudio_server packets.
Domain to not audit.
Relabel packets to pulseaudio_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the puppet port.
Domain allowed access.
Send UDP traffic on the puppet port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the puppet port.
Domain to not audit.
Receive UDP traffic on the puppet port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the puppet port.
Domain to not audit.
Send and receive UDP traffic on the puppet port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the puppet port.
Domain to not audit.
Bind TCP sockets to the puppet port.
Domain allowed access.
Bind UDP sockets to the puppet port.
Domain allowed access.
Make a TCP connection to the puppet port.
Domain allowed access.
Send puppet_client packets.
Domain allowed access.
Do not audit attempts to send puppet_client packets.
Domain to not audit.
Receive puppet_client packets.
Domain allowed access.
Do not audit attempts to receive puppet_client packets.
Domain allowed access.
Send and receive puppet_client packets.
Domain allowed access.
Do not audit attempts to send and receive puppet_client packets.
Domain to not audit.
Relabel packets to puppet_client the packet type.
Domain allowed access.
Send puppet_server packets.
Domain allowed access.
Do not audit attempts to send puppet_server packets.
Domain to not audit.
Receive puppet_server packets.
Domain allowed access.
Do not audit attempts to receive puppet_server packets.
Domain allowed access.
Send and receive puppet_server packets.
Domain allowed access.
Do not audit attempts to send and receive puppet_server packets.
Domain to not audit.
Relabel packets to puppet_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pxe port.
Domain allowed access.
Send UDP traffic on the pxe port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pxe port.
Domain to not audit.
Receive UDP traffic on the pxe port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pxe port.
Domain to not audit.
Send and receive UDP traffic on the pxe port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pxe port.
Domain to not audit.
Bind TCP sockets to the pxe port.
Domain allowed access.
Bind UDP sockets to the pxe port.
Domain allowed access.
Make a TCP connection to the pxe port.
Domain allowed access.
Send pxe_client packets.
Domain allowed access.
Do not audit attempts to send pxe_client packets.
Domain to not audit.
Receive pxe_client packets.
Domain allowed access.
Do not audit attempts to receive pxe_client packets.
Domain allowed access.
Send and receive pxe_client packets.
Domain allowed access.
Do not audit attempts to send and receive pxe_client packets.
Domain to not audit.
Relabel packets to pxe_client the packet type.
Domain allowed access.
Send pxe_server packets.
Domain allowed access.
Do not audit attempts to send pxe_server packets.
Domain to not audit.
Receive pxe_server packets.
Domain allowed access.
Do not audit attempts to receive pxe_server packets.
Domain allowed access.
Send and receive pxe_server packets.
Domain allowed access.
Do not audit attempts to send and receive pxe_server packets.
Domain to not audit.
Relabel packets to pxe_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the pyzor port.
Domain allowed access.
Send UDP traffic on the pyzor port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the pyzor port.
Domain to not audit.
Receive UDP traffic on the pyzor port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the pyzor port.
Domain to not audit.
Send and receive UDP traffic on the pyzor port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the pyzor port.
Domain to not audit.
Bind TCP sockets to the pyzor port.
Domain allowed access.
Bind UDP sockets to the pyzor port.
Domain allowed access.
Make a TCP connection to the pyzor port.
Domain allowed access.
Send pyzor_client packets.
Domain allowed access.
Do not audit attempts to send pyzor_client packets.
Domain to not audit.
Receive pyzor_client packets.
Domain allowed access.
Do not audit attempts to receive pyzor_client packets.
Domain allowed access.
Send and receive pyzor_client packets.
Domain allowed access.
Do not audit attempts to send and receive pyzor_client packets.
Domain to not audit.
Relabel packets to pyzor_client the packet type.
Domain allowed access.
Send pyzor_server packets.
Domain allowed access.
Do not audit attempts to send pyzor_server packets.
Domain to not audit.
Receive pyzor_server packets.
Domain allowed access.
Do not audit attempts to receive pyzor_server packets.
Domain allowed access.
Send and receive pyzor_server packets.
Domain allowed access.
Do not audit attempts to send and receive pyzor_server packets.
Domain to not audit.
Relabel packets to pyzor_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the neutron port.
Domain allowed access.
Send UDP traffic on the neutron port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the neutron port.
Domain to not audit.
Receive UDP traffic on the neutron port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the neutron port.
Domain to not audit.
Send and receive UDP traffic on the neutron port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the neutron port.
Domain to not audit.
Bind TCP sockets to the neutron port.
Domain allowed access.
Bind UDP sockets to the neutron port.
Domain allowed access.
Make a TCP connection to the neutron port.
Domain allowed access.
Send neutron_client packets.
Domain allowed access.
Do not audit attempts to send neutron_client packets.
Domain to not audit.
Receive neutron_client packets.
Domain allowed access.
Do not audit attempts to receive neutron_client packets.
Domain allowed access.
Send and receive neutron_client packets.
Domain allowed access.
Do not audit attempts to send and receive neutron_client packets.
Domain to not audit.
Relabel packets to neutron_client the packet type.
Domain allowed access.
Send neutron_server packets.
Domain allowed access.
Do not audit attempts to send neutron_server packets.
Domain to not audit.
Receive neutron_server packets.
Domain allowed access.
Do not audit attempts to receive neutron_server packets.
Domain allowed access.
Send and receive neutron_server packets.
Domain allowed access.
Do not audit attempts to send and receive neutron_server packets.
Domain to not audit.
Relabel packets to neutron_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the radacct port.
Domain allowed access.
Send UDP traffic on the radacct port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the radacct port.
Domain to not audit.
Receive UDP traffic on the radacct port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the radacct port.
Domain to not audit.
Send and receive UDP traffic on the radacct port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the radacct port.
Domain to not audit.
Bind TCP sockets to the radacct port.
Domain allowed access.
Bind UDP sockets to the radacct port.
Domain allowed access.
Make a TCP connection to the radacct port.
Domain allowed access.
Send radacct_client packets.
Domain allowed access.
Do not audit attempts to send radacct_client packets.
Domain to not audit.
Receive radacct_client packets.
Domain allowed access.
Do not audit attempts to receive radacct_client packets.
Domain allowed access.
Send and receive radacct_client packets.
Domain allowed access.
Do not audit attempts to send and receive radacct_client packets.
Domain to not audit.
Relabel packets to radacct_client the packet type.
Domain allowed access.
Send radacct_server packets.
Domain allowed access.
Do not audit attempts to send radacct_server packets.
Domain to not audit.
Receive radacct_server packets.
Domain allowed access.
Do not audit attempts to receive radacct_server packets.
Domain allowed access.
Send and receive radacct_server packets.
Domain allowed access.
Do not audit attempts to send and receive radacct_server packets.
Domain to not audit.
Relabel packets to radacct_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the radius port.
Domain allowed access.
Send UDP traffic on the radius port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the radius port.
Domain to not audit.
Receive UDP traffic on the radius port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the radius port.
Domain to not audit.
Send and receive UDP traffic on the radius port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the radius port.
Domain to not audit.
Bind TCP sockets to the radius port.
Domain allowed access.
Bind UDP sockets to the radius port.
Domain allowed access.
Make a TCP connection to the radius port.
Domain allowed access.
Send radius_client packets.
Domain allowed access.
Do not audit attempts to send radius_client packets.
Domain to not audit.
Receive radius_client packets.
Domain allowed access.
Do not audit attempts to receive radius_client packets.
Domain allowed access.
Send and receive radius_client packets.
Domain allowed access.
Do not audit attempts to send and receive radius_client packets.
Domain to not audit.
Relabel packets to radius_client the packet type.
Domain allowed access.
Send radius_server packets.
Domain allowed access.
Do not audit attempts to send radius_server packets.
Domain to not audit.
Receive radius_server packets.
Domain allowed access.
Do not audit attempts to receive radius_server packets.
Domain allowed access.
Send and receive radius_server packets.
Domain allowed access.
Do not audit attempts to send and receive radius_server packets.
Domain to not audit.
Relabel packets to radius_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the radsec port.
Domain allowed access.
Send UDP traffic on the radsec port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the radsec port.
Domain to not audit.
Receive UDP traffic on the radsec port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the radsec port.
Domain to not audit.
Send and receive UDP traffic on the radsec port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the radsec port.
Domain to not audit.
Bind TCP sockets to the radsec port.
Domain allowed access.
Bind UDP sockets to the radsec port.
Domain allowed access.
Make a TCP connection to the radsec port.
Domain allowed access.
Send radsec_client packets.
Domain allowed access.
Do not audit attempts to send radsec_client packets.
Domain to not audit.
Receive radsec_client packets.
Domain allowed access.
Do not audit attempts to receive radsec_client packets.
Domain allowed access.
Send and receive radsec_client packets.
Domain allowed access.
Do not audit attempts to send and receive radsec_client packets.
Domain to not audit.
Relabel packets to radsec_client the packet type.
Domain allowed access.
Send radsec_server packets.
Domain allowed access.
Do not audit attempts to send radsec_server packets.
Domain to not audit.
Receive radsec_server packets.
Domain allowed access.
Do not audit attempts to receive radsec_server packets.
Domain allowed access.
Send and receive radsec_server packets.
Domain allowed access.
Do not audit attempts to send and receive radsec_server packets.
Domain to not audit.
Relabel packets to radsec_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the razor port.
Domain allowed access.
Send UDP traffic on the razor port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the razor port.
Domain to not audit.
Receive UDP traffic on the razor port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the razor port.
Domain to not audit.
Send and receive UDP traffic on the razor port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the razor port.
Domain to not audit.
Bind TCP sockets to the razor port.
Domain allowed access.
Bind UDP sockets to the razor port.
Domain allowed access.
Make a TCP connection to the razor port.
Domain allowed access.
Send razor_client packets.
Domain allowed access.
Do not audit attempts to send razor_client packets.
Domain to not audit.
Receive razor_client packets.
Domain allowed access.
Do not audit attempts to receive razor_client packets.
Domain allowed access.
Send and receive razor_client packets.
Domain allowed access.
Do not audit attempts to send and receive razor_client packets.
Domain to not audit.
Relabel packets to razor_client the packet type.
Domain allowed access.
Send razor_server packets.
Domain allowed access.
Do not audit attempts to send razor_server packets.
Domain to not audit.
Receive razor_server packets.
Domain allowed access.
Do not audit attempts to receive razor_server packets.
Domain allowed access.
Send and receive razor_server packets.
Domain allowed access.
Do not audit attempts to send and receive razor_server packets.
Domain to not audit.
Relabel packets to razor_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the redis port.
Domain allowed access.
Send UDP traffic on the redis port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the redis port.
Domain to not audit.
Receive UDP traffic on the redis port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the redis port.
Domain to not audit.
Send and receive UDP traffic on the redis port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the redis port.
Domain to not audit.
Bind TCP sockets to the redis port.
Domain allowed access.
Bind UDP sockets to the redis port.
Domain allowed access.
Make a TCP connection to the redis port.
Domain allowed access.
Send redis_client packets.
Domain allowed access.
Do not audit attempts to send redis_client packets.
Domain to not audit.
Receive redis_client packets.
Domain allowed access.
Do not audit attempts to receive redis_client packets.
Domain allowed access.
Send and receive redis_client packets.
Domain allowed access.
Do not audit attempts to send and receive redis_client packets.
Domain to not audit.
Relabel packets to redis_client the packet type.
Domain allowed access.
Send redis_server packets.
Domain allowed access.
Do not audit attempts to send redis_server packets.
Domain to not audit.
Receive redis_server packets.
Domain allowed access.
Do not audit attempts to receive redis_server packets.
Domain allowed access.
Send and receive redis_server packets.
Domain allowed access.
Do not audit attempts to send and receive redis_server packets.
Domain to not audit.
Relabel packets to redis_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the repository port.
Domain allowed access.
Send UDP traffic on the repository port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the repository port.
Domain to not audit.
Receive UDP traffic on the repository port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the repository port.
Domain to not audit.
Send and receive UDP traffic on the repository port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the repository port.
Domain to not audit.
Bind TCP sockets to the repository port.
Domain allowed access.
Bind UDP sockets to the repository port.
Domain allowed access.
Make a TCP connection to the repository port.
Domain allowed access.
Send repository_client packets.
Domain allowed access.
Do not audit attempts to send repository_client packets.
Domain to not audit.
Receive repository_client packets.
Domain allowed access.
Do not audit attempts to receive repository_client packets.
Domain allowed access.
Send and receive repository_client packets.
Domain allowed access.
Do not audit attempts to send and receive repository_client packets.
Domain to not audit.
Relabel packets to repository_client the packet type.
Domain allowed access.
Send repository_server packets.
Domain allowed access.
Do not audit attempts to send repository_server packets.
Domain to not audit.
Receive repository_server packets.
Domain allowed access.
Do not audit attempts to receive repository_server packets.
Domain allowed access.
Send and receive repository_server packets.
Domain allowed access.
Do not audit attempts to send and receive repository_server packets.
Domain to not audit.
Relabel packets to repository_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ricci port.
Domain allowed access.
Send UDP traffic on the ricci port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ricci port.
Domain to not audit.
Receive UDP traffic on the ricci port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ricci port.
Domain to not audit.
Send and receive UDP traffic on the ricci port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ricci port.
Domain to not audit.
Bind TCP sockets to the ricci port.
Domain allowed access.
Bind UDP sockets to the ricci port.
Domain allowed access.
Make a TCP connection to the ricci port.
Domain allowed access.
Send ricci_client packets.
Domain allowed access.
Do not audit attempts to send ricci_client packets.
Domain to not audit.
Receive ricci_client packets.
Domain allowed access.
Do not audit attempts to receive ricci_client packets.
Domain allowed access.
Send and receive ricci_client packets.
Domain allowed access.
Do not audit attempts to send and receive ricci_client packets.
Domain to not audit.
Relabel packets to ricci_client the packet type.
Domain allowed access.
Send ricci_server packets.
Domain allowed access.
Do not audit attempts to send ricci_server packets.
Domain to not audit.
Receive ricci_server packets.
Domain allowed access.
Do not audit attempts to receive ricci_server packets.
Domain allowed access.
Send and receive ricci_server packets.
Domain allowed access.
Do not audit attempts to send and receive ricci_server packets.
Domain to not audit.
Relabel packets to ricci_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ricci_modcluster port.
Domain allowed access.
Send UDP traffic on the ricci_modcluster port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ricci_modcluster port.
Domain to not audit.
Receive UDP traffic on the ricci_modcluster port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
Domain to not audit.
Send and receive UDP traffic on the ricci_modcluster port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ricci_modcluster port.
Domain to not audit.
Bind TCP sockets to the ricci_modcluster port.
Domain allowed access.
Bind UDP sockets to the ricci_modcluster port.
Domain allowed access.
Make a TCP connection to the ricci_modcluster port.
Domain allowed access.
Send ricci_modcluster_client packets.
Domain allowed access.
Do not audit attempts to send ricci_modcluster_client packets.
Domain to not audit.
Receive ricci_modcluster_client packets.
Domain allowed access.
Do not audit attempts to receive ricci_modcluster_client packets.
Domain allowed access.
Send and receive ricci_modcluster_client packets.
Domain allowed access.
Do not audit attempts to send and receive ricci_modcluster_client packets.
Domain to not audit.
Relabel packets to ricci_modcluster_client the packet type.
Domain allowed access.
Send ricci_modcluster_server packets.
Domain allowed access.
Do not audit attempts to send ricci_modcluster_server packets.
Domain to not audit.
Receive ricci_modcluster_server packets.
Domain allowed access.
Do not audit attempts to receive ricci_modcluster_server packets.
Domain allowed access.
Send and receive ricci_modcluster_server packets.
Domain allowed access.
Do not audit attempts to send and receive ricci_modcluster_server packets.
Domain to not audit.
Relabel packets to ricci_modcluster_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rlogind port.
Domain allowed access.
Send UDP traffic on the rlogind port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rlogind port.
Domain to not audit.
Receive UDP traffic on the rlogind port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rlogind port.
Domain to not audit.
Send and receive UDP traffic on the rlogind port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rlogind port.
Domain to not audit.
Bind TCP sockets to the rlogind port.
Domain allowed access.
Bind UDP sockets to the rlogind port.
Domain allowed access.
Make a TCP connection to the rlogind port.
Domain allowed access.
Send rlogind_client packets.
Domain allowed access.
Do not audit attempts to send rlogind_client packets.
Domain to not audit.
Receive rlogind_client packets.
Domain allowed access.
Do not audit attempts to receive rlogind_client packets.
Domain allowed access.
Send and receive rlogind_client packets.
Domain allowed access.
Do not audit attempts to send and receive rlogind_client packets.
Domain to not audit.
Relabel packets to rlogind_client the packet type.
Domain allowed access.
Send rlogind_server packets.
Domain allowed access.
Do not audit attempts to send rlogind_server packets.
Domain to not audit.
Receive rlogind_server packets.
Domain allowed access.
Do not audit attempts to receive rlogind_server packets.
Domain allowed access.
Send and receive rlogind_server packets.
Domain allowed access.
Do not audit attempts to send and receive rlogind_server packets.
Domain to not audit.
Relabel packets to rlogind_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rndc port.
Domain allowed access.
Send UDP traffic on the rndc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rndc port.
Domain to not audit.
Receive UDP traffic on the rndc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rndc port.
Domain to not audit.
Send and receive UDP traffic on the rndc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rndc port.
Domain to not audit.
Bind TCP sockets to the rndc port.
Domain allowed access.
Bind UDP sockets to the rndc port.
Domain allowed access.
Make a TCP connection to the rndc port.
Domain allowed access.
Send rndc_client packets.
Domain allowed access.
Do not audit attempts to send rndc_client packets.
Domain to not audit.
Receive rndc_client packets.
Domain allowed access.
Do not audit attempts to receive rndc_client packets.
Domain allowed access.
Send and receive rndc_client packets.
Domain allowed access.
Do not audit attempts to send and receive rndc_client packets.
Domain to not audit.
Relabel packets to rndc_client the packet type.
Domain allowed access.
Send rndc_server packets.
Domain allowed access.
Do not audit attempts to send rndc_server packets.
Domain to not audit.
Receive rndc_server packets.
Domain allowed access.
Do not audit attempts to receive rndc_server packets.
Domain allowed access.
Send and receive rndc_server packets.
Domain allowed access.
Do not audit attempts to send and receive rndc_server packets.
Domain to not audit.
Relabel packets to rndc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the router port.
Domain allowed access.
Send UDP traffic on the router port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the router port.
Domain to not audit.
Receive UDP traffic on the router port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the router port.
Domain to not audit.
Send and receive UDP traffic on the router port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the router port.
Domain to not audit.
Bind TCP sockets to the router port.
Domain allowed access.
Bind UDP sockets to the router port.
Domain allowed access.
Make a TCP connection to the router port.
Domain allowed access.
Send router_client packets.
Domain allowed access.
Do not audit attempts to send router_client packets.
Domain to not audit.
Receive router_client packets.
Domain allowed access.
Do not audit attempts to receive router_client packets.
Domain allowed access.
Send and receive router_client packets.
Domain allowed access.
Do not audit attempts to send and receive router_client packets.
Domain to not audit.
Relabel packets to router_client the packet type.
Domain allowed access.
Send router_server packets.
Domain allowed access.
Do not audit attempts to send router_server packets.
Domain to not audit.
Receive router_server packets.
Domain allowed access.
Do not audit attempts to receive router_server packets.
Domain allowed access.
Send and receive router_server packets.
Domain allowed access.
Do not audit attempts to send and receive router_server packets.
Domain to not audit.
Relabel packets to router_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rsh port.
Domain allowed access.
Send UDP traffic on the rsh port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rsh port.
Domain to not audit.
Receive UDP traffic on the rsh port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rsh port.
Domain to not audit.
Send and receive UDP traffic on the rsh port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rsh port.
Domain to not audit.
Bind TCP sockets to the rsh port.
Domain allowed access.
Bind UDP sockets to the rsh port.
Domain allowed access.
Make a TCP connection to the rsh port.
Domain allowed access.
Send rsh_client packets.
Domain allowed access.
Do not audit attempts to send rsh_client packets.
Domain to not audit.
Receive rsh_client packets.
Domain allowed access.
Do not audit attempts to receive rsh_client packets.
Domain allowed access.
Send and receive rsh_client packets.
Domain allowed access.
Do not audit attempts to send and receive rsh_client packets.
Domain to not audit.
Relabel packets to rsh_client the packet type.
Domain allowed access.
Send rsh_server packets.
Domain allowed access.
Do not audit attempts to send rsh_server packets.
Domain to not audit.
Receive rsh_server packets.
Domain allowed access.
Do not audit attempts to receive rsh_server packets.
Domain allowed access.
Send and receive rsh_server packets.
Domain allowed access.
Do not audit attempts to send and receive rsh_server packets.
Domain to not audit.
Relabel packets to rsh_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rsync port.
Domain allowed access.
Send UDP traffic on the rsync port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rsync port.
Domain to not audit.
Receive UDP traffic on the rsync port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rsync port.
Domain to not audit.
Send and receive UDP traffic on the rsync port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rsync port.
Domain to not audit.
Bind TCP sockets to the rsync port.
Domain allowed access.
Bind UDP sockets to the rsync port.
Domain allowed access.
Make a TCP connection to the rsync port.
Domain allowed access.
Send rsync_client packets.
Domain allowed access.
Do not audit attempts to send rsync_client packets.
Domain to not audit.
Receive rsync_client packets.
Domain allowed access.
Do not audit attempts to receive rsync_client packets.
Domain allowed access.
Send and receive rsync_client packets.
Domain allowed access.
Do not audit attempts to send and receive rsync_client packets.
Domain to not audit.
Relabel packets to rsync_client the packet type.
Domain allowed access.
Send rsync_server packets.
Domain allowed access.
Do not audit attempts to send rsync_server packets.
Domain to not audit.
Receive rsync_server packets.
Domain allowed access.
Do not audit attempts to receive rsync_server packets.
Domain allowed access.
Send and receive rsync_server packets.
Domain allowed access.
Do not audit attempts to send and receive rsync_server packets.
Domain to not audit.
Relabel packets to rsync_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the rwho port.
Domain allowed access.
Send UDP traffic on the rwho port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the rwho port.
Domain to not audit.
Receive UDP traffic on the rwho port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the rwho port.
Domain to not audit.
Send and receive UDP traffic on the rwho port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the rwho port.
Domain to not audit.
Bind TCP sockets to the rwho port.
Domain allowed access.
Bind UDP sockets to the rwho port.
Domain allowed access.
Make a TCP connection to the rwho port.
Domain allowed access.
Send rwho_client packets.
Domain allowed access.
Do not audit attempts to send rwho_client packets.
Domain to not audit.
Receive rwho_client packets.
Domain allowed access.
Do not audit attempts to receive rwho_client packets.
Domain allowed access.
Send and receive rwho_client packets.
Domain allowed access.
Do not audit attempts to send and receive rwho_client packets.
Domain to not audit.
Relabel packets to rwho_client the packet type.
Domain allowed access.
Send rwho_server packets.
Domain allowed access.
Do not audit attempts to send rwho_server packets.
Domain to not audit.
Receive rwho_server packets.
Domain allowed access.
Do not audit attempts to receive rwho_server packets.
Domain allowed access.
Send and receive rwho_server packets.
Domain allowed access.
Do not audit attempts to send and receive rwho_server packets.
Domain to not audit.
Relabel packets to rwho_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sap port.
Domain allowed access.
Send UDP traffic on the sap port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sap port.
Domain to not audit.
Receive UDP traffic on the sap port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sap port.
Domain to not audit.
Send and receive UDP traffic on the sap port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sap port.
Domain to not audit.
Bind TCP sockets to the sap port.
Domain allowed access.
Bind UDP sockets to the sap port.
Domain allowed access.
Make a TCP connection to the sap port.
Domain allowed access.
Send sap_client packets.
Domain allowed access.
Do not audit attempts to send sap_client packets.
Domain to not audit.
Receive sap_client packets.
Domain allowed access.
Do not audit attempts to receive sap_client packets.
Domain allowed access.
Send and receive sap_client packets.
Domain allowed access.
Do not audit attempts to send and receive sap_client packets.
Domain to not audit.
Relabel packets to sap_client the packet type.
Domain allowed access.
Send sap_server packets.
Domain allowed access.
Do not audit attempts to send sap_server packets.
Domain to not audit.
Receive sap_server packets.
Domain allowed access.
Do not audit attempts to receive sap_server packets.
Domain allowed access.
Send and receive sap_server packets.
Domain allowed access.
Do not audit attempts to send and receive sap_server packets.
Domain to not audit.
Relabel packets to sap_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the saphostctrl port.
Domain allowed access.
Send UDP traffic on the saphostctrl port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the saphostctrl port.
Domain to not audit.
Receive UDP traffic on the saphostctrl port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the saphostctrl port.
Domain to not audit.
Send and receive UDP traffic on the saphostctrl port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the saphostctrl port.
Domain to not audit.
Bind TCP sockets to the saphostctrl port.
Domain allowed access.
Bind UDP sockets to the saphostctrl port.
Domain allowed access.
Make a TCP connection to the saphostctrl port.
Domain allowed access.
Send saphostctrl_client packets.
Domain allowed access.
Do not audit attempts to send saphostctrl_client packets.
Domain to not audit.
Receive saphostctrl_client packets.
Domain allowed access.
Do not audit attempts to receive saphostctrl_client packets.
Domain allowed access.
Send and receive saphostctrl_client packets.
Domain allowed access.
Do not audit attempts to send and receive saphostctrl_client packets.
Domain to not audit.
Relabel packets to saphostctrl_client the packet type.
Domain allowed access.
Send saphostctrl_server packets.
Domain allowed access.
Do not audit attempts to send saphostctrl_server packets.
Domain to not audit.
Receive saphostctrl_server packets.
Domain allowed access.
Do not audit attempts to receive saphostctrl_server packets.
Domain allowed access.
Send and receive saphostctrl_server packets.
Domain allowed access.
Do not audit attempts to send and receive saphostctrl_server packets.
Domain to not audit.
Relabel packets to saphostctrl_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sieve port.
Domain allowed access.
Send UDP traffic on the sieve port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sieve port.
Domain to not audit.
Receive UDP traffic on the sieve port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sieve port.
Domain to not audit.
Send and receive UDP traffic on the sieve port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sieve port.
Domain to not audit.
Bind TCP sockets to the sieve port.
Domain allowed access.
Bind UDP sockets to the sieve port.
Domain allowed access.
Make a TCP connection to the sieve port.
Domain allowed access.
Send sieve_client packets.
Domain allowed access.
Do not audit attempts to send sieve_client packets.
Domain to not audit.
Receive sieve_client packets.
Domain allowed access.
Do not audit attempts to receive sieve_client packets.
Domain allowed access.
Send and receive sieve_client packets.
Domain allowed access.
Do not audit attempts to send and receive sieve_client packets.
Domain to not audit.
Relabel packets to sieve_client the packet type.
Domain allowed access.
Send sieve_server packets.
Domain allowed access.
Do not audit attempts to send sieve_server packets.
Domain to not audit.
Receive sieve_server packets.
Domain allowed access.
Do not audit attempts to receive sieve_server packets.
Domain allowed access.
Send and receive sieve_server packets.
Domain allowed access.
Do not audit attempts to send and receive sieve_server packets.
Domain to not audit.
Relabel packets to sieve_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sip port.
Domain allowed access.
Send UDP traffic on the sip port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sip port.
Domain to not audit.
Receive UDP traffic on the sip port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sip port.
Domain to not audit.
Send and receive UDP traffic on the sip port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sip port.
Domain to not audit.
Bind TCP sockets to the sip port.
Domain allowed access.
Bind UDP sockets to the sip port.
Domain allowed access.
Make a TCP connection to the sip port.
Domain allowed access.
Send sip_client packets.
Domain allowed access.
Do not audit attempts to send sip_client packets.
Domain to not audit.
Receive sip_client packets.
Domain allowed access.
Do not audit attempts to receive sip_client packets.
Domain allowed access.
Send and receive sip_client packets.
Domain allowed access.
Do not audit attempts to send and receive sip_client packets.
Domain to not audit.
Relabel packets to sip_client the packet type.
Domain allowed access.
Send sip_server packets.
Domain allowed access.
Do not audit attempts to send sip_server packets.
Domain to not audit.
Receive sip_server packets.
Domain allowed access.
Do not audit attempts to receive sip_server packets.
Domain allowed access.
Send and receive sip_server packets.
Domain allowed access.
Do not audit attempts to send and receive sip_server packets.
Domain to not audit.
Relabel packets to sip_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sixxsconfig port.
Domain allowed access.
Send UDP traffic on the sixxsconfig port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sixxsconfig port.
Domain to not audit.
Receive UDP traffic on the sixxsconfig port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sixxsconfig port.
Domain to not audit.
Send and receive UDP traffic on the sixxsconfig port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sixxsconfig port.
Domain to not audit.
Bind TCP sockets to the sixxsconfig port.
Domain allowed access.
Bind UDP sockets to the sixxsconfig port.
Domain allowed access.
Make a TCP connection to the sixxsconfig port.
Domain allowed access.
Send sixxsconfig_client packets.
Domain allowed access.
Do not audit attempts to send sixxsconfig_client packets.
Domain to not audit.
Receive sixxsconfig_client packets.
Domain allowed access.
Do not audit attempts to receive sixxsconfig_client packets.
Domain allowed access.
Send and receive sixxsconfig_client packets.
Domain allowed access.
Do not audit attempts to send and receive sixxsconfig_client packets.
Domain to not audit.
Relabel packets to sixxsconfig_client the packet type.
Domain allowed access.
Send sixxsconfig_server packets.
Domain allowed access.
Do not audit attempts to send sixxsconfig_server packets.
Domain to not audit.
Receive sixxsconfig_server packets.
Domain allowed access.
Do not audit attempts to receive sixxsconfig_server packets.
Domain allowed access.
Send and receive sixxsconfig_server packets.
Domain allowed access.
Do not audit attempts to send and receive sixxsconfig_server packets.
Domain to not audit.
Relabel packets to sixxsconfig_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the smbd port.
Domain allowed access.
Send UDP traffic on the smbd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the smbd port.
Domain to not audit.
Receive UDP traffic on the smbd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the smbd port.
Domain to not audit.
Send and receive UDP traffic on the smbd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the smbd port.
Domain to not audit.
Bind TCP sockets to the smbd port.
Domain allowed access.
Bind UDP sockets to the smbd port.
Domain allowed access.
Make a TCP connection to the smbd port.
Domain allowed access.
Send smbd_client packets.
Domain allowed access.
Do not audit attempts to send smbd_client packets.
Domain to not audit.
Receive smbd_client packets.
Domain allowed access.
Do not audit attempts to receive smbd_client packets.
Domain allowed access.
Send and receive smbd_client packets.
Domain allowed access.
Do not audit attempts to send and receive smbd_client packets.
Domain to not audit.
Relabel packets to smbd_client the packet type.
Domain allowed access.
Send smbd_server packets.
Domain allowed access.
Do not audit attempts to send smbd_server packets.
Domain to not audit.
Receive smbd_server packets.
Domain allowed access.
Do not audit attempts to receive smbd_server packets.
Domain allowed access.
Send and receive smbd_server packets.
Domain allowed access.
Do not audit attempts to send and receive smbd_server packets.
Domain to not audit.
Relabel packets to smbd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the smtp port.
Domain allowed access.
Send UDP traffic on the smtp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the smtp port.
Domain to not audit.
Receive UDP traffic on the smtp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the smtp port.
Domain to not audit.
Send and receive UDP traffic on the smtp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the smtp port.
Domain to not audit.
Bind TCP sockets to the smtp port.
Domain allowed access.
Bind UDP sockets to the smtp port.
Domain allowed access.
Make a TCP connection to the smtp port.
Domain allowed access.
Send smtp_client packets.
Domain allowed access.
Do not audit attempts to send smtp_client packets.
Domain to not audit.
Receive smtp_client packets.
Domain allowed access.
Do not audit attempts to receive smtp_client packets.
Domain allowed access.
Send and receive smtp_client packets.
Domain allowed access.
Do not audit attempts to send and receive smtp_client packets.
Domain to not audit.
Relabel packets to smtp_client the packet type.
Domain allowed access.
Send smtp_server packets.
Domain allowed access.
Do not audit attempts to send smtp_server packets.
Domain to not audit.
Receive smtp_server packets.
Domain allowed access.
Do not audit attempts to receive smtp_server packets.
Domain allowed access.
Send and receive smtp_server packets.
Domain allowed access.
Do not audit attempts to send and receive smtp_server packets.
Domain to not audit.
Relabel packets to smtp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the snmp port.
Domain allowed access.
Send UDP traffic on the snmp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the snmp port.
Domain to not audit.
Receive UDP traffic on the snmp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the snmp port.
Domain to not audit.
Send and receive UDP traffic on the snmp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the snmp port.
Domain to not audit.
Bind TCP sockets to the snmp port.
Domain allowed access.
Bind UDP sockets to the snmp port.
Domain allowed access.
Make a TCP connection to the snmp port.
Domain allowed access.
Send snmp_client packets.
Domain allowed access.
Do not audit attempts to send snmp_client packets.
Domain to not audit.
Receive snmp_client packets.
Domain allowed access.
Do not audit attempts to receive snmp_client packets.
Domain allowed access.
Send and receive snmp_client packets.
Domain allowed access.
Do not audit attempts to send and receive snmp_client packets.
Domain to not audit.
Relabel packets to snmp_client the packet type.
Domain allowed access.
Send snmp_server packets.
Domain allowed access.
Do not audit attempts to send snmp_server packets.
Domain to not audit.
Receive snmp_server packets.
Domain allowed access.
Do not audit attempts to receive snmp_server packets.
Domain allowed access.
Send and receive snmp_server packets.
Domain allowed access.
Do not audit attempts to send and receive snmp_server packets.
Domain to not audit.
Relabel packets to snmp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the soundd port.
Domain allowed access.
Send UDP traffic on the soundd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the soundd port.
Domain to not audit.
Receive UDP traffic on the soundd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the soundd port.
Domain to not audit.
Send and receive UDP traffic on the soundd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the soundd port.
Domain to not audit.
Bind TCP sockets to the soundd port.
Domain allowed access.
Bind UDP sockets to the soundd port.
Domain allowed access.
Make a TCP connection to the soundd port.
Domain allowed access.
Send soundd_client packets.
Domain allowed access.
Do not audit attempts to send soundd_client packets.
Domain to not audit.
Receive soundd_client packets.
Domain allowed access.
Do not audit attempts to receive soundd_client packets.
Domain allowed access.
Send and receive soundd_client packets.
Domain allowed access.
Do not audit attempts to send and receive soundd_client packets.
Domain to not audit.
Relabel packets to soundd_client the packet type.
Domain allowed access.
Send soundd_server packets.
Domain allowed access.
Do not audit attempts to send soundd_server packets.
Domain to not audit.
Receive soundd_server packets.
Domain allowed access.
Do not audit attempts to receive soundd_server packets.
Domain allowed access.
Send and receive soundd_server packets.
Domain allowed access.
Do not audit attempts to send and receive soundd_server packets.
Domain to not audit.
Relabel packets to soundd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the spamd port.
Domain allowed access.
Send UDP traffic on the spamd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the spamd port.
Domain to not audit.
Receive UDP traffic on the spamd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the spamd port.
Domain to not audit.
Send and receive UDP traffic on the spamd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the spamd port.
Domain to not audit.
Bind TCP sockets to the spamd port.
Domain allowed access.
Bind UDP sockets to the spamd port.
Domain allowed access.
Make a TCP connection to the spamd port.
Domain allowed access.
Send spamd_client packets.
Domain allowed access.
Do not audit attempts to send spamd_client packets.
Domain to not audit.
Receive spamd_client packets.
Domain allowed access.
Do not audit attempts to receive spamd_client packets.
Domain allowed access.
Send and receive spamd_client packets.
Domain allowed access.
Do not audit attempts to send and receive spamd_client packets.
Domain to not audit.
Relabel packets to spamd_client the packet type.
Domain allowed access.
Send spamd_server packets.
Domain allowed access.
Do not audit attempts to send spamd_server packets.
Domain to not audit.
Receive spamd_server packets.
Domain allowed access.
Do not audit attempts to receive spamd_server packets.
Domain allowed access.
Send and receive spamd_server packets.
Domain allowed access.
Do not audit attempts to send and receive spamd_server packets.
Domain to not audit.
Relabel packets to spamd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the speech port.
Domain allowed access.
Send UDP traffic on the speech port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the speech port.
Domain to not audit.
Receive UDP traffic on the speech port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the speech port.
Domain to not audit.
Send and receive UDP traffic on the speech port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the speech port.
Domain to not audit.
Bind TCP sockets to the speech port.
Domain allowed access.
Bind UDP sockets to the speech port.
Domain allowed access.
Make a TCP connection to the speech port.
Domain allowed access.
Send speech_client packets.
Domain allowed access.
Do not audit attempts to send speech_client packets.
Domain to not audit.
Receive speech_client packets.
Domain allowed access.
Do not audit attempts to receive speech_client packets.
Domain allowed access.
Send and receive speech_client packets.
Domain allowed access.
Do not audit attempts to send and receive speech_client packets.
Domain to not audit.
Relabel packets to speech_client the packet type.
Domain allowed access.
Send speech_server packets.
Domain allowed access.
Do not audit attempts to send speech_server packets.
Domain to not audit.
Receive speech_server packets.
Domain allowed access.
Do not audit attempts to receive speech_server packets.
Domain allowed access.
Send and receive speech_server packets.
Domain allowed access.
Do not audit attempts to send and receive speech_server packets.
Domain to not audit.
Relabel packets to speech_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the squid port.
Domain allowed access.
Send UDP traffic on the squid port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the squid port.
Domain to not audit.
Receive UDP traffic on the squid port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the squid port.
Domain to not audit.
Send and receive UDP traffic on the squid port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the squid port.
Domain to not audit.
Bind TCP sockets to the squid port.
Domain allowed access.
Bind UDP sockets to the squid port.
Domain allowed access.
Make a TCP connection to the squid port.
Domain allowed access.
Send squid_client packets.
Domain allowed access.
Do not audit attempts to send squid_client packets.
Domain to not audit.
Receive squid_client packets.
Domain allowed access.
Do not audit attempts to receive squid_client packets.
Domain allowed access.
Send and receive squid_client packets.
Domain allowed access.
Do not audit attempts to send and receive squid_client packets.
Domain to not audit.
Relabel packets to squid_client the packet type.
Domain allowed access.
Send squid_server packets.
Domain allowed access.
Do not audit attempts to send squid_server packets.
Domain to not audit.
Receive squid_server packets.
Domain allowed access.
Do not audit attempts to receive squid_server packets.
Domain allowed access.
Send and receive squid_server packets.
Domain allowed access.
Do not audit attempts to send and receive squid_server packets.
Domain to not audit.
Relabel packets to squid_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ssh port.
Domain allowed access.
Send UDP traffic on the ssh port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ssh port.
Domain to not audit.
Receive UDP traffic on the ssh port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ssh port.
Domain to not audit.
Send and receive UDP traffic on the ssh port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ssh port.
Domain to not audit.
Bind TCP sockets to the ssh port.
Domain allowed access.
Bind UDP sockets to the ssh port.
Domain allowed access.
Make a TCP connection to the ssh port.
Domain allowed access.
Send ssh_client packets.
Domain allowed access.
Do not audit attempts to send ssh_client packets.
Domain to not audit.
Receive ssh_client packets.
Domain allowed access.
Do not audit attempts to receive ssh_client packets.
Domain allowed access.
Send and receive ssh_client packets.
Domain allowed access.
Do not audit attempts to send and receive ssh_client packets.
Domain to not audit.
Relabel packets to ssh_client the packet type.
Domain allowed access.
Send ssh_server packets.
Domain allowed access.
Do not audit attempts to send ssh_server packets.
Domain to not audit.
Receive ssh_server packets.
Domain allowed access.
Do not audit attempts to receive ssh_server packets.
Domain allowed access.
Send and receive ssh_server packets.
Domain allowed access.
Do not audit attempts to send and receive ssh_server packets.
Domain to not audit.
Relabel packets to ssh_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the streaming port.
Domain allowed access.
Send UDP traffic on the streaming port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the streaming port.
Domain to not audit.
Receive UDP traffic on the streaming port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the streaming port.
Domain to not audit.
Send and receive UDP traffic on the streaming port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the streaming port.
Domain to not audit.
Bind TCP sockets to the streaming port.
Domain allowed access.
Bind UDP sockets to the streaming port.
Domain allowed access.
Make a TCP connection to the streaming port.
Domain allowed access.
Send streaming_client packets.
Domain allowed access.
Do not audit attempts to send streaming_client packets.
Domain to not audit.
Receive streaming_client packets.
Domain allowed access.
Do not audit attempts to receive streaming_client packets.
Domain allowed access.
Send and receive streaming_client packets.
Domain allowed access.
Do not audit attempts to send and receive streaming_client packets.
Domain to not audit.
Relabel packets to streaming_client the packet type.
Domain allowed access.
Send streaming_server packets.
Domain allowed access.
Do not audit attempts to send streaming_server packets.
Domain to not audit.
Receive streaming_server packets.
Domain allowed access.
Do not audit attempts to receive streaming_server packets.
Domain allowed access.
Send and receive streaming_server packets.
Domain allowed access.
Do not audit attempts to send and receive streaming_server packets.
Domain to not audit.
Relabel packets to streaming_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the svn port.
Domain allowed access.
Send UDP traffic on the svn port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the svn port.
Domain to not audit.
Receive UDP traffic on the svn port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the svn port.
Domain to not audit.
Send and receive UDP traffic on the svn port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the svn port.
Domain to not audit.
Bind TCP sockets to the svn port.
Domain allowed access.
Bind UDP sockets to the svn port.
Domain allowed access.
Make a TCP connection to the svn port.
Domain allowed access.
Send svn_client packets.
Domain allowed access.
Do not audit attempts to send svn_client packets.
Domain to not audit.
Receive svn_client packets.
Domain allowed access.
Do not audit attempts to receive svn_client packets.
Domain allowed access.
Send and receive svn_client packets.
Domain allowed access.
Do not audit attempts to send and receive svn_client packets.
Domain to not audit.
Relabel packets to svn_client the packet type.
Domain allowed access.
Send svn_server packets.
Domain allowed access.
Do not audit attempts to send svn_server packets.
Domain to not audit.
Receive svn_server packets.
Domain allowed access.
Do not audit attempts to receive svn_server packets.
Domain allowed access.
Send and receive svn_server packets.
Domain allowed access.
Do not audit attempts to send and receive svn_server packets.
Domain to not audit.
Relabel packets to svn_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the swat port.
Domain allowed access.
Send UDP traffic on the swat port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the swat port.
Domain to not audit.
Receive UDP traffic on the swat port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the swat port.
Domain to not audit.
Send and receive UDP traffic on the swat port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the swat port.
Domain to not audit.
Bind TCP sockets to the swat port.
Domain allowed access.
Bind UDP sockets to the swat port.
Domain allowed access.
Make a TCP connection to the swat port.
Domain allowed access.
Send swat_client packets.
Domain allowed access.
Do not audit attempts to send swat_client packets.
Domain to not audit.
Receive swat_client packets.
Domain allowed access.
Do not audit attempts to receive swat_client packets.
Domain allowed access.
Send and receive swat_client packets.
Domain allowed access.
Do not audit attempts to send and receive swat_client packets.
Domain to not audit.
Relabel packets to swat_client the packet type.
Domain allowed access.
Send swat_server packets.
Domain allowed access.
Do not audit attempts to send swat_server packets.
Domain to not audit.
Receive swat_server packets.
Domain allowed access.
Do not audit attempts to receive swat_server packets.
Domain allowed access.
Send and receive swat_server packets.
Domain allowed access.
Do not audit attempts to send and receive swat_server packets.
Domain to not audit.
Relabel packets to swat_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the sype port.
Domain allowed access.
Send UDP traffic on the sype port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the sype port.
Domain to not audit.
Receive UDP traffic on the sype port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the sype port.
Domain to not audit.
Send and receive UDP traffic on the sype port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the sype port.
Domain to not audit.
Bind TCP sockets to the sype port.
Domain allowed access.
Bind UDP sockets to the sype port.
Domain allowed access.
Make a TCP connection to the sype port.
Domain allowed access.
Send sype_client packets.
Domain allowed access.
Do not audit attempts to send sype_client packets.
Domain to not audit.
Receive sype_client packets.
Domain allowed access.
Do not audit attempts to receive sype_client packets.
Domain allowed access.
Send and receive sype_client packets.
Domain allowed access.
Do not audit attempts to send and receive sype_client packets.
Domain to not audit.
Relabel packets to sype_client the packet type.
Domain allowed access.
Send sype_server packets.
Domain allowed access.
Do not audit attempts to send sype_server packets.
Domain to not audit.
Receive sype_server packets.
Domain allowed access.
Do not audit attempts to receive sype_server packets.
Domain allowed access.
Send and receive sype_server packets.
Domain allowed access.
Do not audit attempts to send and receive sype_server packets.
Domain to not audit.
Relabel packets to sype_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the syslogd port.
Domain allowed access.
Send UDP traffic on the syslogd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the syslogd port.
Domain to not audit.
Receive UDP traffic on the syslogd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the syslogd port.
Domain to not audit.
Send and receive UDP traffic on the syslogd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the syslogd port.
Domain to not audit.
Bind TCP sockets to the syslogd port.
Domain allowed access.
Bind UDP sockets to the syslogd port.
Domain allowed access.
Make a TCP connection to the syslogd port.
Domain allowed access.
Send syslogd_client packets.
Domain allowed access.
Do not audit attempts to send syslogd_client packets.
Domain to not audit.
Receive syslogd_client packets.
Domain allowed access.
Do not audit attempts to receive syslogd_client packets.
Domain allowed access.
Send and receive syslogd_client packets.
Domain allowed access.
Do not audit attempts to send and receive syslogd_client packets.
Domain to not audit.
Relabel packets to syslogd_client the packet type.
Domain allowed access.
Send syslogd_server packets.
Domain allowed access.
Do not audit attempts to send syslogd_server packets.
Domain to not audit.
Receive syslogd_server packets.
Domain allowed access.
Do not audit attempts to receive syslogd_server packets.
Domain allowed access.
Send and receive syslogd_server packets.
Domain allowed access.
Do not audit attempts to send and receive syslogd_server packets.
Domain to not audit.
Relabel packets to syslogd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the telnetd port.
Domain allowed access.
Send UDP traffic on the telnetd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the telnetd port.
Domain to not audit.
Receive UDP traffic on the telnetd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the telnetd port.
Domain to not audit.
Send and receive UDP traffic on the telnetd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the telnetd port.
Domain to not audit.
Bind TCP sockets to the telnetd port.
Domain allowed access.
Bind UDP sockets to the telnetd port.
Domain allowed access.
Make a TCP connection to the telnetd port.
Domain allowed access.
Send telnetd_client packets.
Domain allowed access.
Do not audit attempts to send telnetd_client packets.
Domain to not audit.
Receive telnetd_client packets.
Domain allowed access.
Do not audit attempts to receive telnetd_client packets.
Domain allowed access.
Send and receive telnetd_client packets.
Domain allowed access.
Do not audit attempts to send and receive telnetd_client packets.
Domain to not audit.
Relabel packets to telnetd_client the packet type.
Domain allowed access.
Send telnetd_server packets.
Domain allowed access.
Do not audit attempts to send telnetd_server packets.
Domain to not audit.
Receive telnetd_server packets.
Domain allowed access.
Do not audit attempts to receive telnetd_server packets.
Domain allowed access.
Send and receive telnetd_server packets.
Domain allowed access.
Do not audit attempts to send and receive telnetd_server packets.
Domain to not audit.
Relabel packets to telnetd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the tftp port.
Domain allowed access.
Send UDP traffic on the tftp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the tftp port.
Domain to not audit.
Receive UDP traffic on the tftp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the tftp port.
Domain to not audit.
Send and receive UDP traffic on the tftp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the tftp port.
Domain to not audit.
Bind TCP sockets to the tftp port.
Domain allowed access.
Bind UDP sockets to the tftp port.
Domain allowed access.
Make a TCP connection to the tftp port.
Domain allowed access.
Send tftp_client packets.
Domain allowed access.
Do not audit attempts to send tftp_client packets.
Domain to not audit.
Receive tftp_client packets.
Domain allowed access.
Do not audit attempts to receive tftp_client packets.
Domain allowed access.
Send and receive tftp_client packets.
Domain allowed access.
Do not audit attempts to send and receive tftp_client packets.
Domain to not audit.
Relabel packets to tftp_client the packet type.
Domain allowed access.
Send tftp_server packets.
Domain allowed access.
Do not audit attempts to send tftp_server packets.
Domain to not audit.
Receive tftp_server packets.
Domain allowed access.
Do not audit attempts to receive tftp_server packets.
Domain allowed access.
Send and receive tftp_server packets.
Domain allowed access.
Do not audit attempts to send and receive tftp_server packets.
Domain to not audit.
Relabel packets to tftp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the tor port.
Domain allowed access.
Send UDP traffic on the tor port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the tor port.
Domain to not audit.
Receive UDP traffic on the tor port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the tor port.
Domain to not audit.
Send and receive UDP traffic on the tor port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the tor port.
Domain to not audit.
Bind TCP sockets to the tor port.
Domain allowed access.
Bind UDP sockets to the tor port.
Domain allowed access.
Make a TCP connection to the tor port.
Domain allowed access.
Send tor_client packets.
Domain allowed access.
Do not audit attempts to send tor_client packets.
Domain to not audit.
Receive tor_client packets.
Domain allowed access.
Do not audit attempts to receive tor_client packets.
Domain allowed access.
Send and receive tor_client packets.
Domain allowed access.
Do not audit attempts to send and receive tor_client packets.
Domain to not audit.
Relabel packets to tor_client the packet type.
Domain allowed access.
Send tor_server packets.
Domain allowed access.
Do not audit attempts to send tor_server packets.
Domain to not audit.
Receive tor_server packets.
Domain allowed access.
Do not audit attempts to receive tor_server packets.
Domain allowed access.
Send and receive tor_server packets.
Domain allowed access.
Do not audit attempts to send and receive tor_server packets.
Domain to not audit.
Relabel packets to tor_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the tor_socks port.
Domain allowed access.
Send UDP traffic on the tor_socks port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the tor_socks port.
Domain to not audit.
Receive UDP traffic on the tor_socks port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the tor_socks port.
Domain to not audit.
Send and receive UDP traffic on the tor_socks port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the tor_socks port.
Domain to not audit.
Bind TCP sockets to the tor_socks port.
Domain allowed access.
Bind UDP sockets to the tor_socks port.
Domain allowed access.
Make a TCP connection to the tor_socks port.
Domain allowed access.
Send tor_socks_client packets.
Domain allowed access.
Do not audit attempts to send tor_socks_client packets.
Domain to not audit.
Receive tor_socks_client packets.
Domain allowed access.
Do not audit attempts to receive tor_socks_client packets.
Domain allowed access.
Send and receive tor_socks_client packets.
Domain allowed access.
Do not audit attempts to send and receive tor_socks_client packets.
Domain to not audit.
Relabel packets to tor_socks_client the packet type.
Domain allowed access.
Send tor_socks_server packets.
Domain allowed access.
Do not audit attempts to send tor_socks_server packets.
Domain to not audit.
Receive tor_socks_server packets.
Domain allowed access.
Do not audit attempts to receive tor_socks_server packets.
Domain allowed access.
Send and receive tor_socks_server packets.
Domain allowed access.
Do not audit attempts to send and receive tor_socks_server packets.
Domain to not audit.
Relabel packets to tor_socks_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the traceroute port.
Domain allowed access.
Send UDP traffic on the traceroute port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the traceroute port.
Domain to not audit.
Receive UDP traffic on the traceroute port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the traceroute port.
Domain to not audit.
Send and receive UDP traffic on the traceroute port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the traceroute port.
Domain to not audit.
Bind TCP sockets to the traceroute port.
Domain allowed access.
Bind UDP sockets to the traceroute port.
Domain allowed access.
Make a TCP connection to the traceroute port.
Domain allowed access.
Send traceroute_client packets.
Domain allowed access.
Do not audit attempts to send traceroute_client packets.
Domain to not audit.
Receive traceroute_client packets.
Domain allowed access.
Do not audit attempts to receive traceroute_client packets.
Domain allowed access.
Send and receive traceroute_client packets.
Domain allowed access.
Do not audit attempts to send and receive traceroute_client packets.
Domain to not audit.
Relabel packets to traceroute_client the packet type.
Domain allowed access.
Send traceroute_server packets.
Domain allowed access.
Do not audit attempts to send traceroute_server packets.
Domain to not audit.
Receive traceroute_server packets.
Domain allowed access.
Do not audit attempts to receive traceroute_server packets.
Domain allowed access.
Send and receive traceroute_server packets.
Domain allowed access.
Do not audit attempts to send and receive traceroute_server packets.
Domain to not audit.
Relabel packets to traceroute_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the transproxy port.
Domain allowed access.
Send UDP traffic on the transproxy port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the transproxy port.
Domain to not audit.
Receive UDP traffic on the transproxy port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the transproxy port.
Domain to not audit.
Send and receive UDP traffic on the transproxy port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the transproxy port.
Domain to not audit.
Bind TCP sockets to the transproxy port.
Domain allowed access.
Bind UDP sockets to the transproxy port.
Domain allowed access.
Make a TCP connection to the transproxy port.
Domain allowed access.
Send transproxy_client packets.
Domain allowed access.
Do not audit attempts to send transproxy_client packets.
Domain to not audit.
Receive transproxy_client packets.
Domain allowed access.
Do not audit attempts to receive transproxy_client packets.
Domain allowed access.
Send and receive transproxy_client packets.
Domain allowed access.
Do not audit attempts to send and receive transproxy_client packets.
Domain to not audit.
Relabel packets to transproxy_client the packet type.
Domain allowed access.
Send transproxy_server packets.
Domain allowed access.
Do not audit attempts to send transproxy_server packets.
Domain to not audit.
Receive transproxy_server packets.
Domain allowed access.
Do not audit attempts to receive transproxy_server packets.
Domain allowed access.
Send and receive transproxy_server packets.
Domain allowed access.
Do not audit attempts to send and receive transproxy_server packets.
Domain to not audit.
Relabel packets to transproxy_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the ups port.
Domain allowed access.
Send UDP traffic on the ups port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the ups port.
Domain to not audit.
Receive UDP traffic on the ups port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the ups port.
Domain to not audit.
Send and receive UDP traffic on the ups port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the ups port.
Domain to not audit.
Bind TCP sockets to the ups port.
Domain allowed access.
Bind UDP sockets to the ups port.
Domain allowed access.
Make a TCP connection to the ups port.
Domain allowed access.
Send ups_client packets.
Domain allowed access.
Do not audit attempts to send ups_client packets.
Domain to not audit.
Receive ups_client packets.
Domain allowed access.
Do not audit attempts to receive ups_client packets.
Domain allowed access.
Send and receive ups_client packets.
Domain allowed access.
Do not audit attempts to send and receive ups_client packets.
Domain to not audit.
Relabel packets to ups_client the packet type.
Domain allowed access.
Send ups_server packets.
Domain allowed access.
Do not audit attempts to send ups_server packets.
Domain to not audit.
Receive ups_server packets.
Domain allowed access.
Do not audit attempts to receive ups_server packets.
Domain allowed access.
Send and receive ups_server packets.
Domain allowed access.
Do not audit attempts to send and receive ups_server packets.
Domain to not audit.
Relabel packets to ups_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the uucpd port.
Domain allowed access.
Send UDP traffic on the uucpd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the uucpd port.
Domain to not audit.
Receive UDP traffic on the uucpd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the uucpd port.
Domain to not audit.
Send and receive UDP traffic on the uucpd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the uucpd port.
Domain to not audit.
Bind TCP sockets to the uucpd port.
Domain allowed access.
Bind UDP sockets to the uucpd port.
Domain allowed access.
Make a TCP connection to the uucpd port.
Domain allowed access.
Send uucpd_client packets.
Domain allowed access.
Do not audit attempts to send uucpd_client packets.
Domain to not audit.
Receive uucpd_client packets.
Domain allowed access.
Do not audit attempts to receive uucpd_client packets.
Domain allowed access.
Send and receive uucpd_client packets.
Domain allowed access.
Do not audit attempts to send and receive uucpd_client packets.
Domain to not audit.
Relabel packets to uucpd_client the packet type.
Domain allowed access.
Send uucpd_server packets.
Domain allowed access.
Do not audit attempts to send uucpd_server packets.
Domain to not audit.
Receive uucpd_server packets.
Domain allowed access.
Do not audit attempts to receive uucpd_server packets.
Domain allowed access.
Send and receive uucpd_server packets.
Domain allowed access.
Do not audit attempts to send and receive uucpd_server packets.
Domain to not audit.
Relabel packets to uucpd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the varnishd port.
Domain allowed access.
Send UDP traffic on the varnishd port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the varnishd port.
Domain to not audit.
Receive UDP traffic on the varnishd port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the varnishd port.
Domain to not audit.
Send and receive UDP traffic on the varnishd port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the varnishd port.
Domain to not audit.
Bind TCP sockets to the varnishd port.
Domain allowed access.
Bind UDP sockets to the varnishd port.
Domain allowed access.
Make a TCP connection to the varnishd port.
Domain allowed access.
Send varnishd_client packets.
Domain allowed access.
Do not audit attempts to send varnishd_client packets.
Domain to not audit.
Receive varnishd_client packets.
Domain allowed access.
Do not audit attempts to receive varnishd_client packets.
Domain allowed access.
Send and receive varnishd_client packets.
Domain allowed access.
Do not audit attempts to send and receive varnishd_client packets.
Domain to not audit.
Relabel packets to varnishd_client the packet type.
Domain allowed access.
Send varnishd_server packets.
Domain allowed access.
Do not audit attempts to send varnishd_server packets.
Domain to not audit.
Receive varnishd_server packets.
Domain allowed access.
Do not audit attempts to receive varnishd_server packets.
Domain allowed access.
Send and receive varnishd_server packets.
Domain allowed access.
Do not audit attempts to send and receive varnishd_server packets.
Domain to not audit.
Relabel packets to varnishd_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the virt port.
Domain allowed access.
Send UDP traffic on the virt port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the virt port.
Domain to not audit.
Receive UDP traffic on the virt port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the virt port.
Domain to not audit.
Send and receive UDP traffic on the virt port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the virt port.
Domain to not audit.
Bind TCP sockets to the virt port.
Domain allowed access.
Bind UDP sockets to the virt port.
Domain allowed access.
Make a TCP connection to the virt port.
Domain allowed access.
Send virt_client packets.
Domain allowed access.
Do not audit attempts to send virt_client packets.
Domain to not audit.
Receive virt_client packets.
Domain allowed access.
Do not audit attempts to receive virt_client packets.
Domain allowed access.
Send and receive virt_client packets.
Domain allowed access.
Do not audit attempts to send and receive virt_client packets.
Domain to not audit.
Relabel packets to virt_client the packet type.
Domain allowed access.
Send virt_server packets.
Domain allowed access.
Do not audit attempts to send virt_server packets.
Domain to not audit.
Receive virt_server packets.
Domain allowed access.
Do not audit attempts to receive virt_server packets.
Domain allowed access.
Send and receive virt_server packets.
Domain allowed access.
Do not audit attempts to send and receive virt_server packets.
Domain to not audit.
Relabel packets to virt_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the virt_migration port.
Domain allowed access.
Send UDP traffic on the virt_migration port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the virt_migration port.
Domain to not audit.
Receive UDP traffic on the virt_migration port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the virt_migration port.
Domain to not audit.
Send and receive UDP traffic on the virt_migration port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the virt_migration port.
Domain to not audit.
Bind TCP sockets to the virt_migration port.
Domain allowed access.
Bind UDP sockets to the virt_migration port.
Domain allowed access.
Make a TCP connection to the virt_migration port.
Domain allowed access.
Send virt_migration_client packets.
Domain allowed access.
Do not audit attempts to send virt_migration_client packets.
Domain to not audit.
Receive virt_migration_client packets.
Domain allowed access.
Do not audit attempts to receive virt_migration_client packets.
Domain allowed access.
Send and receive virt_migration_client packets.
Domain allowed access.
Do not audit attempts to send and receive virt_migration_client packets.
Domain to not audit.
Relabel packets to virt_migration_client the packet type.
Domain allowed access.
Send virt_migration_server packets.
Domain allowed access.
Do not audit attempts to send virt_migration_server packets.
Domain to not audit.
Receive virt_migration_server packets.
Domain allowed access.
Do not audit attempts to receive virt_migration_server packets.
Domain allowed access.
Send and receive virt_migration_server packets.
Domain allowed access.
Do not audit attempts to send and receive virt_migration_server packets.
Domain to not audit.
Relabel packets to virt_migration_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the vnc port.
Domain allowed access.
Send UDP traffic on the vnc port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the vnc port.
Domain to not audit.
Receive UDP traffic on the vnc port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the vnc port.
Domain to not audit.
Send and receive UDP traffic on the vnc port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the vnc port.
Domain to not audit.
Bind TCP sockets to the vnc port.
Domain allowed access.
Bind UDP sockets to the vnc port.
Domain allowed access.
Make a TCP connection to the vnc port.
Domain allowed access.
Send vnc_client packets.
Domain allowed access.
Do not audit attempts to send vnc_client packets.
Domain to not audit.
Receive vnc_client packets.
Domain allowed access.
Do not audit attempts to receive vnc_client packets.
Domain allowed access.
Send and receive vnc_client packets.
Domain allowed access.
Do not audit attempts to send and receive vnc_client packets.
Domain to not audit.
Relabel packets to vnc_client the packet type.
Domain allowed access.
Send vnc_server packets.
Domain allowed access.
Do not audit attempts to send vnc_server packets.
Domain to not audit.
Receive vnc_server packets.
Domain allowed access.
Do not audit attempts to receive vnc_server packets.
Domain allowed access.
Send and receive vnc_server packets.
Domain allowed access.
Do not audit attempts to send and receive vnc_server packets.
Domain to not audit.
Relabel packets to vnc_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the wccp port.
Domain allowed access.
Send UDP traffic on the wccp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the wccp port.
Domain to not audit.
Receive UDP traffic on the wccp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the wccp port.
Domain to not audit.
Send and receive UDP traffic on the wccp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the wccp port.
Domain to not audit.
Bind TCP sockets to the wccp port.
Domain allowed access.
Bind UDP sockets to the wccp port.
Domain allowed access.
Make a TCP connection to the wccp port.
Domain allowed access.
Send wccp_client packets.
Domain allowed access.
Do not audit attempts to send wccp_client packets.
Domain to not audit.
Receive wccp_client packets.
Domain allowed access.
Do not audit attempts to receive wccp_client packets.
Domain allowed access.
Send and receive wccp_client packets.
Domain allowed access.
Do not audit attempts to send and receive wccp_client packets.
Domain to not audit.
Relabel packets to wccp_client the packet type.
Domain allowed access.
Send wccp_server packets.
Domain allowed access.
Do not audit attempts to send wccp_server packets.
Domain to not audit.
Receive wccp_server packets.
Domain allowed access.
Do not audit attempts to receive wccp_server packets.
Domain allowed access.
Send and receive wccp_server packets.
Domain allowed access.
Do not audit attempts to send and receive wccp_server packets.
Domain to not audit.
Relabel packets to wccp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the websm port.
Domain allowed access.
Send UDP traffic on the websm port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the websm port.
Domain to not audit.
Receive UDP traffic on the websm port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the websm port.
Domain to not audit.
Send and receive UDP traffic on the websm port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the websm port.
Domain to not audit.
Bind TCP sockets to the websm port.
Domain allowed access.
Bind UDP sockets to the websm port.
Domain allowed access.
Make a TCP connection to the websm port.
Domain allowed access.
Send websm_client packets.
Domain allowed access.
Do not audit attempts to send websm_client packets.
Domain to not audit.
Receive websm_client packets.
Domain allowed access.
Do not audit attempts to receive websm_client packets.
Domain allowed access.
Send and receive websm_client packets.
Domain allowed access.
Do not audit attempts to send and receive websm_client packets.
Domain to not audit.
Relabel packets to websm_client the packet type.
Domain allowed access.
Send websm_server packets.
Domain allowed access.
Do not audit attempts to send websm_server packets.
Domain to not audit.
Receive websm_server packets.
Domain allowed access.
Do not audit attempts to receive websm_server packets.
Domain allowed access.
Send and receive websm_server packets.
Domain allowed access.
Do not audit attempts to send and receive websm_server packets.
Domain to not audit.
Relabel packets to websm_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the whois port.
Domain allowed access.
Send UDP traffic on the whois port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the whois port.
Domain to not audit.
Receive UDP traffic on the whois port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the whois port.
Domain to not audit.
Send and receive UDP traffic on the whois port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the whois port.
Domain to not audit.
Bind TCP sockets to the whois port.
Domain allowed access.
Bind UDP sockets to the whois port.
Domain allowed access.
Make a TCP connection to the whois port.
Domain allowed access.
Send whois_client packets.
Domain allowed access.
Do not audit attempts to send whois_client packets.
Domain to not audit.
Receive whois_client packets.
Domain allowed access.
Do not audit attempts to receive whois_client packets.
Domain allowed access.
Send and receive whois_client packets.
Domain allowed access.
Do not audit attempts to send and receive whois_client packets.
Domain to not audit.
Relabel packets to whois_client the packet type.
Domain allowed access.
Send whois_server packets.
Domain allowed access.
Do not audit attempts to send whois_server packets.
Domain to not audit.
Receive whois_server packets.
Domain allowed access.
Do not audit attempts to receive whois_server packets.
Domain allowed access.
Send and receive whois_server packets.
Domain allowed access.
Do not audit attempts to send and receive whois_server packets.
Domain to not audit.
Relabel packets to whois_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the winshadow port.
Domain allowed access.
Send UDP traffic on the winshadow port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the winshadow port.
Domain to not audit.
Receive UDP traffic on the winshadow port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the winshadow port.
Domain to not audit.
Send and receive UDP traffic on the winshadow port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the winshadow port.
Domain to not audit.
Bind TCP sockets to the winshadow port.
Domain allowed access.
Bind UDP sockets to the winshadow port.
Domain allowed access.
Make a TCP connection to the winshadow port.
Domain allowed access.
Send winshadow_client packets.
Domain allowed access.
Do not audit attempts to send winshadow_client packets.
Domain to not audit.
Receive winshadow_client packets.
Domain allowed access.
Do not audit attempts to receive winshadow_client packets.
Domain allowed access.
Send and receive winshadow_client packets.
Domain allowed access.
Do not audit attempts to send and receive winshadow_client packets.
Domain to not audit.
Relabel packets to winshadow_client the packet type.
Domain allowed access.
Send winshadow_server packets.
Domain allowed access.
Do not audit attempts to send winshadow_server packets.
Domain to not audit.
Receive winshadow_server packets.
Domain allowed access.
Do not audit attempts to receive winshadow_server packets.
Domain allowed access.
Send and receive winshadow_server packets.
Domain allowed access.
Do not audit attempts to send and receive winshadow_server packets.
Domain to not audit.
Relabel packets to winshadow_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the xdmcp port.
Domain allowed access.
Send UDP traffic on the xdmcp port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the xdmcp port.
Domain to not audit.
Receive UDP traffic on the xdmcp port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the xdmcp port.
Domain to not audit.
Send and receive UDP traffic on the xdmcp port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the xdmcp port.
Domain to not audit.
Bind TCP sockets to the xdmcp port.
Domain allowed access.
Bind UDP sockets to the xdmcp port.
Domain allowed access.
Make a TCP connection to the xdmcp port.
Domain allowed access.
Send xdmcp_client packets.
Domain allowed access.
Do not audit attempts to send xdmcp_client packets.
Domain to not audit.
Receive xdmcp_client packets.
Domain allowed access.
Do not audit attempts to receive xdmcp_client packets.
Domain allowed access.
Send and receive xdmcp_client packets.
Domain allowed access.
Do not audit attempts to send and receive xdmcp_client packets.
Domain to not audit.
Relabel packets to xdmcp_client the packet type.
Domain allowed access.
Send xdmcp_server packets.
Domain allowed access.
Do not audit attempts to send xdmcp_server packets.
Domain to not audit.
Receive xdmcp_server packets.
Domain allowed access.
Do not audit attempts to receive xdmcp_server packets.
Domain allowed access.
Send and receive xdmcp_server packets.
Domain allowed access.
Do not audit attempts to send and receive xdmcp_server packets.
Domain to not audit.
Relabel packets to xdmcp_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the xen port.
Domain allowed access.
Send UDP traffic on the xen port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the xen port.
Domain to not audit.
Receive UDP traffic on the xen port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the xen port.
Domain to not audit.
Send and receive UDP traffic on the xen port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the xen port.
Domain to not audit.
Bind TCP sockets to the xen port.
Domain allowed access.
Bind UDP sockets to the xen port.
Domain allowed access.
Make a TCP connection to the xen port.
Domain allowed access.
Send xen_client packets.
Domain allowed access.
Do not audit attempts to send xen_client packets.
Domain to not audit.
Receive xen_client packets.
Domain allowed access.
Do not audit attempts to receive xen_client packets.
Domain allowed access.
Send and receive xen_client packets.
Domain allowed access.
Do not audit attempts to send and receive xen_client packets.
Domain to not audit.
Relabel packets to xen_client the packet type.
Domain allowed access.
Send xen_server packets.
Domain allowed access.
Do not audit attempts to send xen_server packets.
Domain to not audit.
Receive xen_server packets.
Domain allowed access.
Do not audit attempts to receive xen_server packets.
Domain allowed access.
Send and receive xen_server packets.
Domain allowed access.
Do not audit attempts to send and receive xen_server packets.
Domain to not audit.
Relabel packets to xen_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the xfs port.
Domain allowed access.
Send UDP traffic on the xfs port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the xfs port.
Domain to not audit.
Receive UDP traffic on the xfs port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the xfs port.
Domain to not audit.
Send and receive UDP traffic on the xfs port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the xfs port.
Domain to not audit.
Bind TCP sockets to the xfs port.
Domain allowed access.
Bind UDP sockets to the xfs port.
Domain allowed access.
Make a TCP connection to the xfs port.
Domain allowed access.
Send xfs_client packets.
Domain allowed access.
Do not audit attempts to send xfs_client packets.
Domain to not audit.
Receive xfs_client packets.
Domain allowed access.
Do not audit attempts to receive xfs_client packets.
Domain allowed access.
Send and receive xfs_client packets.
Domain allowed access.
Do not audit attempts to send and receive xfs_client packets.
Domain to not audit.
Relabel packets to xfs_client the packet type.
Domain allowed access.
Send xfs_server packets.
Domain allowed access.
Do not audit attempts to send xfs_server packets.
Domain to not audit.
Receive xfs_server packets.
Domain allowed access.
Do not audit attempts to receive xfs_server packets.
Domain allowed access.
Send and receive xfs_server packets.
Domain allowed access.
Do not audit attempts to send and receive xfs_server packets.
Domain to not audit.
Relabel packets to xfs_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the xserver port.
Domain allowed access.
Send UDP traffic on the xserver port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the xserver port.
Domain to not audit.
Receive UDP traffic on the xserver port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the xserver port.
Domain to not audit.
Send and receive UDP traffic on the xserver port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the xserver port.
Domain to not audit.
Bind TCP sockets to the xserver port.
Domain allowed access.
Bind UDP sockets to the xserver port.
Domain allowed access.
Make a TCP connection to the xserver port.
Domain allowed access.
Send xserver_client packets.
Domain allowed access.
Do not audit attempts to send xserver_client packets.
Domain to not audit.
Receive xserver_client packets.
Domain allowed access.
Do not audit attempts to receive xserver_client packets.
Domain allowed access.
Send and receive xserver_client packets.
Domain allowed access.
Do not audit attempts to send and receive xserver_client packets.
Domain to not audit.
Relabel packets to xserver_client the packet type.
Domain allowed access.
Send xserver_server packets.
Domain allowed access.
Do not audit attempts to send xserver_server packets.
Domain to not audit.
Receive xserver_server packets.
Domain allowed access.
Do not audit attempts to receive xserver_server packets.
Domain allowed access.
Send and receive xserver_server packets.
Domain allowed access.
Do not audit attempts to send and receive xserver_server packets.
Domain to not audit.
Relabel packets to xserver_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zarafa port.
Domain allowed access.
Send UDP traffic on the zarafa port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zarafa port.
Domain to not audit.
Receive UDP traffic on the zarafa port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zarafa port.
Domain to not audit.
Send and receive UDP traffic on the zarafa port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zarafa port.
Domain to not audit.
Bind TCP sockets to the zarafa port.
Domain allowed access.
Bind UDP sockets to the zarafa port.
Domain allowed access.
Make a TCP connection to the zarafa port.
Domain allowed access.
Send zarafa_client packets.
Domain allowed access.
Do not audit attempts to send zarafa_client packets.
Domain to not audit.
Receive zarafa_client packets.
Domain allowed access.
Do not audit attempts to receive zarafa_client packets.
Domain allowed access.
Send and receive zarafa_client packets.
Domain allowed access.
Do not audit attempts to send and receive zarafa_client packets.
Domain to not audit.
Relabel packets to zarafa_client the packet type.
Domain allowed access.
Send zarafa_server packets.
Domain allowed access.
Do not audit attempts to send zarafa_server packets.
Domain to not audit.
Receive zarafa_server packets.
Domain allowed access.
Do not audit attempts to receive zarafa_server packets.
Domain allowed access.
Send and receive zarafa_server packets.
Domain allowed access.
Do not audit attempts to send and receive zarafa_server packets.
Domain to not audit.
Relabel packets to zarafa_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zabbix port.
Domain allowed access.
Send UDP traffic on the zabbix port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zabbix port.
Domain to not audit.
Receive UDP traffic on the zabbix port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zabbix port.
Domain to not audit.
Send and receive UDP traffic on the zabbix port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zabbix port.
Domain to not audit.
Bind TCP sockets to the zabbix port.
Domain allowed access.
Bind UDP sockets to the zabbix port.
Domain allowed access.
Make a TCP connection to the zabbix port.
Domain allowed access.
Send zabbix_client packets.
Domain allowed access.
Do not audit attempts to send zabbix_client packets.
Domain to not audit.
Receive zabbix_client packets.
Domain allowed access.
Do not audit attempts to receive zabbix_client packets.
Domain allowed access.
Send and receive zabbix_client packets.
Domain allowed access.
Do not audit attempts to send and receive zabbix_client packets.
Domain to not audit.
Relabel packets to zabbix_client the packet type.
Domain allowed access.
Send zabbix_server packets.
Domain allowed access.
Do not audit attempts to send zabbix_server packets.
Domain to not audit.
Receive zabbix_server packets.
Domain allowed access.
Do not audit attempts to receive zabbix_server packets.
Domain allowed access.
Send and receive zabbix_server packets.
Domain allowed access.
Do not audit attempts to send and receive zabbix_server packets.
Domain to not audit.
Relabel packets to zabbix_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zabbix_agent port.
Domain allowed access.
Send UDP traffic on the zabbix_agent port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zabbix_agent port.
Domain to not audit.
Receive UDP traffic on the zabbix_agent port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zabbix_agent port.
Domain to not audit.
Send and receive UDP traffic on the zabbix_agent port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zabbix_agent port.
Domain to not audit.
Bind TCP sockets to the zabbix_agent port.
Domain allowed access.
Bind UDP sockets to the zabbix_agent port.
Domain allowed access.
Make a TCP connection to the zabbix_agent port.
Domain allowed access.
Send zabbix_agent_client packets.
Domain allowed access.
Do not audit attempts to send zabbix_agent_client packets.
Domain to not audit.
Receive zabbix_agent_client packets.
Domain allowed access.
Do not audit attempts to receive zabbix_agent_client packets.
Domain allowed access.
Send and receive zabbix_agent_client packets.
Domain allowed access.
Do not audit attempts to send and receive zabbix_agent_client packets.
Domain to not audit.
Relabel packets to zabbix_agent_client the packet type.
Domain allowed access.
Send zabbix_agent_server packets.
Domain allowed access.
Do not audit attempts to send zabbix_agent_server packets.
Domain to not audit.
Receive zabbix_agent_server packets.
Domain allowed access.
Do not audit attempts to receive zabbix_agent_server packets.
Domain allowed access.
Send and receive zabbix_agent_server packets.
Domain allowed access.
Do not audit attempts to send and receive zabbix_agent_server packets.
Domain to not audit.
Relabel packets to zabbix_agent_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zebra port.
Domain allowed access.
Send UDP traffic on the zebra port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zebra port.
Domain to not audit.
Receive UDP traffic on the zebra port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zebra port.
Domain to not audit.
Send and receive UDP traffic on the zebra port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zebra port.
Domain to not audit.
Bind TCP sockets to the zebra port.
Domain allowed access.
Bind UDP sockets to the zebra port.
Domain allowed access.
Make a TCP connection to the zebra port.
Domain allowed access.
Send zebra_client packets.
Domain allowed access.
Do not audit attempts to send zebra_client packets.
Domain to not audit.
Receive zebra_client packets.
Domain allowed access.
Do not audit attempts to receive zebra_client packets.
Domain allowed access.
Send and receive zebra_client packets.
Domain allowed access.
Do not audit attempts to send and receive zebra_client packets.
Domain to not audit.
Relabel packets to zebra_client the packet type.
Domain allowed access.
Send zebra_server packets.
Domain allowed access.
Do not audit attempts to send zebra_server packets.
Domain to not audit.
Receive zebra_server packets.
Domain allowed access.
Do not audit attempts to receive zebra_server packets.
Domain allowed access.
Send and receive zebra_server packets.
Domain allowed access.
Do not audit attempts to send and receive zebra_server packets.
Domain to not audit.
Relabel packets to zebra_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zented port.
Domain allowed access.
Send UDP traffic on the zented port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zented port.
Domain to not audit.
Receive UDP traffic on the zented port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zented port.
Domain to not audit.
Send and receive UDP traffic on the zented port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zented port.
Domain to not audit.
Bind TCP sockets to the zented port.
Domain allowed access.
Bind UDP sockets to the zented port.
Domain allowed access.
Make a TCP connection to the zented port.
Domain allowed access.
Send zented_client packets.
Domain allowed access.
Do not audit attempts to send zented_client packets.
Domain to not audit.
Receive zented_client packets.
Domain allowed access.
Do not audit attempts to receive zented_client packets.
Domain allowed access.
Send and receive zented_client packets.
Domain allowed access.
Do not audit attempts to send and receive zented_client packets.
Domain to not audit.
Relabel packets to zented_client the packet type.
Domain allowed access.
Send zented_server packets.
Domain allowed access.
Do not audit attempts to send zented_server packets.
Domain to not audit.
Receive zented_server packets.
Domain allowed access.
Do not audit attempts to receive zented_server packets.
Domain allowed access.
Send and receive zented_server packets.
Domain allowed access.
Do not audit attempts to send and receive zented_server packets.
Domain to not audit.
Relabel packets to zented_server the packet type.
Domain allowed access.
Send and receive TCP traffic on the zope port.
Domain allowed access.
Send UDP traffic on the zope port.
Domain allowed access.
Do not audit attempts to send UDP traffic on the zope port.
Domain to not audit.
Receive UDP traffic on the zope port.
Domain allowed access.
Do not audit attempts to receive UDP traffic on the zope port.
Domain to not audit.
Send and receive UDP traffic on the zope port.
Domain allowed access.
Do not audit attempts to send and receive
UDP traffic on the zope port.
Domain to not audit.
Bind TCP sockets to the zope port.
Domain allowed access.
Bind UDP sockets to the zope port.
Domain allowed access.
Make a TCP connection to the zope port.
Domain allowed access.
Send zope_client packets.
Domain allowed access.
Do not audit attempts to send zope_client packets.
Domain to not audit.
Receive zope_client packets.
Domain allowed access.
Do not audit attempts to receive zope_client packets.
Domain allowed access.
Send and receive zope_client packets.
Domain allowed access.
Do not audit attempts to send and receive zope_client packets.
Domain to not audit.
Relabel packets to zope_client the packet type.
Domain allowed access.
Send zope_server packets.
Domain allowed access.
Do not audit attempts to send zope_server packets.
Domain to not audit.
Receive zope_server packets.
Domain allowed access.
Do not audit attempts to receive zope_server packets.
Domain allowed access.
Send and receive zope_server packets.
Domain allowed access.
Do not audit attempts to send and receive zope_server packets.
Domain to not audit.
Relabel packets to zope_server the packet type.
Domain allowed access.
Send and receive TCP network traffic on the lo interface.
Domain allowed access.
Send UDP network traffic on the lo interface.
Domain allowed access.
Receive UDP network traffic on the lo interface.
Domain allowed access.
Send and receive UDP network traffic on the lo interface.
Domain allowed access.
Send raw IP packets on the lo interface.
Domain allowed access.
Receive raw IP packets on the lo interface.
Domain allowed access.
Send and receive raw IP packets on the lo interface.
Domain allowed access.
Device nodes and interfaces for many basic system devices.
This module creates the device node concept and provides
the policy for many of the device files. Notable exceptions are
the mass storage and terminal devices that are covered by other
modules.
This module creates the concept of a device node. That is a
char or block device file, usually in /dev. All types that
are used to label device nodes should use the dev_node macro.
Additionally, this module controls access to three things:
- the device directories containing device nodes
- device nodes as a group
- individual access to specific device nodes covered by
this module.
Depended on by other required modules.
Make the specified type usable for device
nodes in a filesystem.
Make the specified type usable for device nodes
in a filesystem. Types used for device nodes that
do not use this interface, or an interface that
calls this one, will have unexpected behaviors
while the system is running.
Example:
type mydev_t;
dev_node(mydev_t)
allow mydomain_t mydev_t:chr_file read_chr_file_perms;
Related interfaces:
Type to be used for device nodes.
Get attributes of device filesystems.
Domain allowed access.
Mount a filesystem on /dev
Domain allow access.
Allow full relabeling (to and from) of all device nodes.
Domain allowed to relabel.
List all of the device nodes in a device directory.
Domain allowed to list device nodes.
Set the attributes of /dev directories.
Domain allowed access.
Dontaudit attempts to list all device nodes.
Domain to dontaudit listing of device nodes.
Add entries to directories in /dev.
Domain allowed to add entries.
Add entries to directories in /dev.
Domain allowed to add entries.
Create a directory in the device directory.
Domain allowed to create the directory.
Delete a directory in the device directory.
Domain allowed to create the directory.
Manage of directories in /dev.
Domain allowed to relabel.
Allow full relabeling (to and from) of directories in /dev.
Domain allowed to relabel.
dontaudit getattr generic files in /dev.
Domain to not audit.
Read and write generic files in /dev.
Domain allowed access.
Delete generic files in /dev.
Domain allowed access.
Create a file in the device directory.
Domain allowed to create the files.
Dontaudit getattr on generic pipes.
Domain to dontaudit.
Allow getattr on generic block devices.
Domain allowed access.
Dontaudit getattr on generic block devices.
Domain to dontaudit access.
Dontaudit setattr on generic block devices.
Domain to dontaudit access.
Create generic block device files.
Domain allowed access.
Delete generic block device files.
Domain allowed access.
Allow getattr for generic character device files.
Domain allowed access.
Dontaudit getattr for generic character device files.
Domain to dontaudit access.
Dontaudit read for generic character device files.
Domain to dontaudit access.
Dontaudit read for generic character device files.
Domain to dontaudit access.
Dontaudit setattr for generic character device files.
Domain to dontaudit access.
Read and write generic character device files.
Domain allowed access.
Create generic character device files.
Domain allowed access.
Delete generic character device files.
Domain allowed access.
Do not audit attempts to set the attributes
of symbolic links in device directories (/dev).
Domain to not audit.
Read symbolic links in device directories.
Domain allowed access.
Create symbolic links in device directories.
Domain allowed access.
Delete symbolic links in device directories.
Domain allowed access.
Create, delete, read, and write symbolic links in device directories.
Domain allowed access.
Relabel symbolic links in device directories.
Domain allowed access.
Create, delete, read, and write device nodes in device directories.
Domain allowed access.
Dontaudit getattr for generic device files.
Domain to dontaudit access.
Dontaudit getattr for generic device files.
Domain to dontaudit access.
Create, delete, read, and write block device files.
Domain allowed access.
Create, delete, read, and write character device files.
Domain allowed access.
Create, read, and write device nodes. The node
will be transitioned to the type provided.
Domain allowed access.
Type to which the created node will be transitioned.
Object class(es) (single or set including {}) for which this
the transition will occur.
Create, read, and write device nodes. The node
will be transitioned to the type provided. This is
a temporary interface until devtmpfs functionality
fixed.
Domain allowed access.
Object class(es) (single or set including {}) for which this
the transition will occur.
Getattr on all block file device nodes.
Domain allowed access.
Dontaudit getattr on all block file device nodes.
Domain to dontaudit access.
Getattr on all character file device nodes.
Domain allowed access.
Dontaudit getattr on all character file device nodes.
Domain to dontaudit access.
Dontaudit getattr on all device nodes.
Domain to not audit.
Setattr on all block file device nodes.
Domain allowed access.
Setattr on all character file device nodes.
Domain allowed access.
Dontaudit read on all block file device nodes.
Domain to not audit.
Dontaudit write on all block file device nodes.
Domain to not audit.
Dontaudit read on all character file device nodes.
Domain to not audit.
Dontaudit write on all character file device nodes.
Domain to not audit.
Create all block device files.
Domain allowed access.
Create all character device files.
Domain allowed access.
rw all inherited character device files.
Domain allowed access.
rw all inherited blk device files.
Domain allowed access.
Delete all block device files.
Domain allowed access.
Delete all character device files.
Domain allowed access.
Rename all block device files.
Domain allowed access.
Rename all character device files.
Domain allowed access.
Read, write, create, and delete all block device files.
Domain allowed access.
Read, write, create, and delete all character device files.
Domain allowed access.
Getattr the agp devices.
Domain allowed access.
Read and write the agp devices.
Domain allowed access.
Get the attributes of the apm bios device node.
Domain allowed access.
Do not audit attempts to get the attributes of
the apm bios device node.
Domain to not audit.
Set the attributes of the apm bios device node.
Domain allowed access.
Do not audit attempts to set the attributes of
the apm bios device node.
Domain to not audit.
Read and write the apm bios.
Domain allowed access.
Get the attributes of the autofs device node.
Domain allowed access.
Do not audit attempts to get the attributes of
the autofs device node.
Domain to not audit.
Set the attributes of the autofs device node.
Domain allowed access.
Do not audit attempts to set the attributes of
the autofs device node.
Domain to not audit.
Read and write the autofs device.
Domain allowed access.
Read and write the PCMCIA card manager device.
Domain allowed access.
Do not audit attempts to read and
write the PCMCIA card manager device.
Domain to not audit.
Create, read, write, and delete
the PCMCIA card manager device
with the correct type.
Domain allowed access.
Create, read, write, and delete
the PCMCIA card manager device.
Domain allowed access.
Automatic type transition to the type
for PCMCIA card manager device nodes when
created in /dev.
Domain allowed access.
Get the attributes of the CPU
microcode and id interfaces.
Domain allowed access.
Set the attributes of the CPU
microcode and id interfaces.
Domain allowed access.
Read the CPU identity.
Domain allowed access.
Read and write the the CPU microcode device. This
is required to load CPU microcode.
Domain allowed access.
Read the the hardware SSL accelerator.
Domain allowed access.
Read the kernel crash device
Domain allowed access.
Read and write the the hardware SSL accelerator.
Domain allowed access.
Set the attributes of the dlm control devices.
Domain allowed access.
Read and write the the dlm control device
Domain allowed access.
getattr the dri devices.
Domain allowed access.
Setattr the dri devices.
Domain allowed access.
Read and write the dri devices.
Domain allowed access.
Dontaudit read and write on the dri devices.
Domain to dontaudit access.
Create, read, write, and delete the dri devices.
Domain allowed access.
Automatic type transition to the type
for DRI device nodes when created in /dev.
Domain allowed access.
Get the attributes of the event devices.
Domain allowed access.
Set the attributes of the event devices.
Domain allowed access.
Read input event devices (/dev/input).
Domain allowed access.
Read input event devices (/dev/input).
Domain allowed access.
Get the attributes of the framebuffer device node.
Domain allowed access.
Set the attributes of the framebuffer device node.
Domain allowed access.
Dot not audit attempts to set the attributes
of the framebuffer device node.
Domain to not audit.
Read the framebuffer.
Domain allowed access.
Do not audit attempts to read the framebuffer.
Domain allowed access.
Write the framebuffer.
Domain allowed access.
Read and write the framebuffer.
Domain allowed access.
Read the kernel messages
Domain allowed access.
Do not audit attempts to read the kernel messages
Domain to not audit.
Write to the kernel messages device
Domain allowed access.
Get the attributes of the ksm devices.
Domain allowed access.
Set the attributes of the ksm devices.
Domain allowed access.
Read the ksm devices.
Domain allowed access.
Read and write to ksm devices.
Domain allowed access.
Get the attributes of the kvm devices.
Domain allowed access.
Set the attributes of the kvm devices.
Domain allowed access.
Read the kvm devices.
Domain allowed access.
Read and write to kvm devices.
Domain allowed access.
Read the lirc device.
Domain allowed access.
Read and write the lirc device.
Domain allowed access.
Automatic type transition to the type
for lirc device nodes when created in /dev.
Domain allowed access.
Get the attributes of the lvm comtrol device.
Domain allowed access.
Read the lvm comtrol device.
Domain allowed access.
Read and write the lvm control device.
Domain allowed access.
Do not audit attempts to read and write lvm control device.
Domain allowed access.
Delete the lvm control device.
Domain allowed access.
dontaudit getattr raw memory devices (e.g. /dev/mem).
Domain allowed access.
Read raw memory devices (e.g. /dev/mem).
Domain allowed access.
Do not audit attempts to read raw memory devices
(e.g. /dev/mem).
Domain to not audit.
Write raw memory devices (e.g. /dev/mem).
Domain allowed access.
Read and execute raw memory devices (e.g. /dev/mem).
Domain allowed access.
Write and execute raw memory devices (e.g. /dev/mem).
Domain allowed access.
Get the attributes of miscellaneous devices.
Domain allowed access.
Do not audit attempts to get the attributes
of miscellaneous devices.
Domain allowed access.
Set the attributes of miscellaneous devices.
Domain allowed access.
Do not audit attempts to set the attributes
of miscellaneous devices.
Domain allowed access.
Read miscellaneous devices.
Domain allowed access.
Read and write ipmi devices.
Domain allowed access.
Write miscellaneous devices.
Domain allowed access.
Do not audit attempts to read and write miscellaneous devices.
Domain allowed access.
Get the attributes of the modem devices.
Domain allowed access.
Set the attributes of the modem devices.
Domain allowed access.
Read the modem devices.
Domain allowed access.
Read and write to modem devices.
Domain allowed access.
Get the attributes of the mouse devices.
Domain allowed access.
Set the attributes of the mouse devices.
Domain allowed access.
Read the mouse devices.
Domain allowed access.
Read and write to mouse devices.
Domain allowed access.
Get the attributes of the memory type range
registers (MTRR) device.
Domain allowed access.
Dontaudit get the attributes of the memory type range
registers (MTRR) device.
Domain allowed access.
Read the memory type range
registers (MTRR). (Deprecated)
Read the memory type range
registers (MTRR). This interface has
been deprecated, dev_rw_mtrr() should be
used instead.
The MTRR device ioctls can be used for
reading and writing; thus, read access to the
device cannot be separated from write access.
Domain allowed access.
Write the memory type range
registers (MTRR). (Deprecated)
Write the memory type range
registers (MTRR). This interface has
been deprecated, dev_rw_mtrr() should be
used instead.
The MTRR device ioctls can be used for
reading and writing; thus, write access to the
device cannot be separated from read access.
Domain allowed access.
Do not audit attempts to write the memory type
range registers (MTRR).
Domain to not audit.
Read and write the memory type range registers (MTRR).
Domain allowed access.
Get the attributes of the network control device
Domain allowed access.
Read the network control identity.
Domain allowed access.
Read and write the the network control device.
Domain allowed access.
Get the attributes of the null device nodes.
Domain allowed access.
Set the attributes of the null device nodes.
Domain allowed access.
Delete the null device (/dev/null).
Domain allowed access.
Read and write to the null device (/dev/null).
Domain allowed access.
Create the null device (/dev/null).
Domain allowed access.
Do not audit attempts to get the attributes
of the BIOS non-volatile RAM device.
Domain allowed access.
Read and write BIOS non-volatile RAM.
Domain allowed access.
Read Non-Volatile Memory Host Controller Interface.
Domain allowed access.
Get the attributes of the printer device nodes.
Domain allowed access.
Set the attributes of the printer device nodes.
Domain allowed access.
Append the printer device.
Domain allowed access.
Read and write the printer device.
Domain allowed access.
Get the attributes of the QEMU
microcode and id interfaces.
Domain allowed access.
Set the attributes of the QEMU
microcode and id interfaces.
Domain allowed access.
Read the QEMU device
Domain allowed access.
Read and write the the QEMU device.
Domain allowed access.
Read from random number generator
devices (e.g., /dev/random).
Allow the specified domain to read from random number
generator devices (e.g., /dev/random). Typically this is
used in situations when a cryptographically secure random
number is needed.
Related interface:
Domain allowed access.
Do not audit attempts to read from random
number generator devices (e.g., /dev/random)
Domain allowed access.
Do not audit attempts to append to random
number generator devices (e.g., /dev/random)
Domain allowed access.
Write to the random device (e.g., /dev/random). This adds
entropy used to generate the random data read from the
random device.
Domain allowed access.
Read the realtime clock (/dev/rtc).
Domain allowed access.
Set the realtime clock (/dev/rtc).
Domain allowed access.
Read and set the realtime clock (/dev/rtc).
Domain allowed access.
Get the attributes of the scanner device.
Domain allowed access.
Do not audit attempts to get the attributes of
the scanner device.
Domain to not audit.
Set the attributes of the scanner device.
Domain allowed access.
Do not audit attempts to set the attributes of
the scanner device.
Domain to not audit.
Read and write the scanner device.
Domain allowed access.
Get the attributes of the sound devices.
Domain allowed access.
Set the attributes of the sound devices.
Domain allowed access.
Read the sound devices.
Domain allowed access.
Write the sound devices.
Domain allowed access.
Read the sound mixer devices.
Domain allowed access.
Write the sound mixer devices.
Domain allowed access.
Get the attributes of the the power management device.
Domain allowed access.
Set the attributes of the the power management device.
Domain allowed access.
Read and write the the power management device.
Domain allowed access.
Getattr on smartcard devices
Domain allowed access.
dontaudit getattr on smartcard devices
Domain allowed access.
Read and write smartcard devices.
Domain allowed access.
Create, read, write, and delete smartcard devices.
Domain allowed access.
Associate a file to a sysfs filesystem.
The type of the file to be associated to sysfs.
Get the attributes of sysfs directories.
The type of the process performing this action.
Mount a filesystem on /sys
Domain allow access.
Mount sysfs filesystems.
Domain allowed access.
Unmount sysfs filesystems.
Domain allowed access.
Search the sysfs directories.
The type of the process performing this action.
Do not audit attempts to search sysfs.
The type of the process performing this action.
List the contents of the sysfs directories.
The type of the process performing this action.
Write in a sysfs directories.
The type of the process performing this action.
Read hardware state information.
Allow the specified domain to read the contents of
the sysfs filesystem. This filesystem contains
information, parameters, and other settings on the
hardware installed on the system.
Domain allowed access.
Allow caller to modify hardware state information.
The process type modifying hardware state information.
Read from pseudo random number generator devices (e.g., /dev/urandom).
Allow the specified domain to read from pseudo random number
generator devices (e.g., /dev/urandom). Typically this is
used in situations when a cryptographically secure random
number is not necessarily needed. One example is the Stack
Smashing Protector (SSP, formerly known as ProPolice) support
that may be compiled into programs.
Related interface:
Related tunable:
Domain allowed access.
Do not audit attempts to read from pseudo
random devices (e.g., /dev/urandom)
Domain to not audit.
Write to the pseudo random device (e.g., /dev/urandom). This
sets the random number generator seed.
Domain allowed access.
Do not audit attempts to write to pseudo
random devices (e.g., /dev/urandom)
Domain to not audit.
Getattr generic the USB devices.
Domain allowed access.
Setattr generic the USB devices.
Domain allowed access.
Read generic the USB devices.
Domain allowed access.
Read and write generic the USB devices.
Domain allowed access.
Allow relabeling (to and from) of generic usb device
Domain allowed to relabel.
Read USB monitor devices.
Domain allowed access.
Write USB monitor devices.
Domain allowed access.
Mount a usbfs filesystem.
The type of the process performing this action.
Associate a file to a usbfs filesystem.
The type of the file to be associated to usbfs.
Get the attributes of a directory in the usb filesystem.
Domain allowed access.
Do not audit attempts to get the attributes
of a directory in the usb filesystem.
Domain to not audit.
Search the directory containing USB hardware information.
The type of the process performing this action.
Allow caller to get a list of usb hardware.
The process type getting the list.
Set the attributes of usbfs filesystem.
Domain allowed access.
Read USB hardware information using
the usbfs filesystem interface.
The type of the process performing this action.
Allow caller to modify usb hardware configuration files.
The process type modifying the options.
Allow read/write the vhost net device
Domain allowed access.
Get the attributes of video4linux devices.
Domain allowed access.
Read and write userio device.
Domain allowed access.
Do not audit attempts to get the attributes
of video4linux device nodes.
Domain to not audit.
Set the attributes of video4linux device nodes.
Domain allowed access.
Do not audit attempts to set the attributes
of video4linux device nodes.
Domain to not audit.
Read the video4linux devices.
Domain allowed access.
Write the video4linux devices.
Domain allowed access.
Read and write VMWare devices.
Domain allowed access.
Read, write, and mmap VMWare devices.
Domain allowed access.
Read to watchdog devices.
Domain allowed access.
Write to watchdog devices.
Domain allowed access.
Read and write the the wireless device.
Domain allowed access.
Read and write Xen devices.
Domain allowed access.
Create, read, write, and delete Xen devices.
Domain allowed access.
Automatic type transition to the type
for xen device nodes when created in /dev.
Domain allowed access.
Get the attributes of X server miscellaneous devices.
Domain allowed access.
Set the attributes of X server miscellaneous devices.
Domain allowed access.
Read and write X server miscellaneous devices.
Domain allowed access.
Read and write to the zero device (/dev/zero).
Domain allowed access.
Read, write, and execute the zero device (/dev/zero).
Domain allowed access.
Execmod the zero device (/dev/zero).
Domain allowed access.
Create the zero device (/dev/zero).
Domain allowed access.
Unconfined access to devices.
Domain allowed access.
Core policy for domains.
Contains the concept of a domain.
Make the specified type usable as a basic domain.
Make the specified type usable as a basic domain.
This is primarily used for kernel threads;
generally the domain_type() interface is
more appropriate for userland processes.
Type to be used as a basic domain type.
Make the specified type usable as a domain.
Make the specified type usable as a domain. This,
or an interface that calls this interface, must be
used on all types that are used as domains.
Related interfaces:
- application_domain()
- init_daemon_domain()
- init_domaion()
- init_ranged_daemon_domain()
- init_ranged_domain()
- init_ranged_system_domain()
- init_script_domain()
- init_system_domain()
Example:
type mydomain_t;
domain_type(mydomain_t)
type myfile_t;
files_type(myfile_t)
allow mydomain_t myfile_t:file read_file_perms;
Type to be used as a domain type.
Make the specified type usable as
an entry point for the domain.
Domain to be entered.
Type of program used for entering
the domain.
Make the file descriptors of the specified
domain for interactive use (widely inheritable)
Domain allowed access.
Allow the specified domain to perform
dynamic transitions.
Allow the specified domain to perform
dynamic transitions.
This violates process tranquility, and it
is strongly suggested that this not be used.
Domain allowed access.
Makes caller and execption to the constraint
preventing changing to the system user
identity and system role.
Domain allowed access.
Makes caller an exception to the constraint preventing
changing of user identity.
The process type to make an exception to the constraint.
Makes caller an exception to the constraint preventing
changing of role.
The process type to make an exception to the constraint.
Makes caller an exception to the constraint preventing
changing the user identity in object contexts.
The process type to make an exception to the constraint.
Make the specified domain the target of
the user domain exception of the
SELinux role and identity change
constraints.
Make the specified domain the target of
the user domain exception of the
SELinux role and identity change
constraints.
This interface is needed to decouple
the user domains from the base module.
It should not be used other than on
user domains.
Domain target for user exemption.
Make the specified domain the source of
the cron domain exception of the
SELinux role and identity change
constraints.
Make the specified domain the source of
the cron domain exception of the
SELinux role and identity change
constraints.
This interface is needed to decouple
the cron domains from the base module.
It should not be used other than on
cron domains.
Domain target for user exemption.
Make the specified domain the target of
the cron domain exception of the
SELinux role and identity change
constraints.
Make the specified domain the target of
the cron domain exception of the
SELinux role and identity change
constraints.
This interface is needed to decouple
the cron domains from the base module.
It should not be used other than on
user cron jobs.
Domain target for user exemption.
Inherit and use file descriptors from
domains with interactive programs.
Allow the specified domain to inherit and use file
descriptors from domains with interactive programs.
This does not allow access to the objects being referenced
by the file descriptors.
Domain allowed access.
Do not audit attempts to inherit file
descriptors from domains with interactive
programs.
Domain allowed access.
Send a SIGCHLD signal to domains whose file
discriptors are widely inheritable.
Domain allowed access.
Set the nice level of all domains.
Domain allowed access.
Send general signals to all domains.
Domain allowed access.
Send a null signal to all domains.
Domain allowed access.
Send a null signal to all domains.
Domain allowed access.
Send a stop signal to all domains.
Domain allowed access.
Send a child terminated signal to all domains.
Domain allowed access.
Send a kill signal to all domains.
Domain allowed access.
Search the process state directory (/proc/pid) of all domains.
Domain allowed access.
Do not audit attempts to search the process
state directory (/proc/pid) of all domains.
Domain to not audit.
Read the process state (/proc/pid) of all domains.
Domain allowed access.
Get the attributes of all domains.
Domain allowed access.
Dontaudit geting the attributes of all domains.
Domain allowed access.
Read the process state (/proc/pid) of all confined domains.
Domain allowed access.
Get the attributes of all confined domains.
Domain allowed access.
Ptrace all domains.
Domain allowed access.
Do not audit attempts to ptrace all domains.
Do not audit attempts to ptrace all domains.
Generally this needs to be suppressed because procps tries to access
/proc/pid/environ and this now triggers a ptrace check in recent kernels
(2.4 and 2.6).
Domain allowed access.
Do not audit attempts to ptrace confined domains.
Do not audit attempts to ptrace confined domains.
Generally this needs to be suppressed because procps tries to access
/proc/pid/environ and this now triggers a ptrace check in recent kernels
(2.4 and 2.6).
Domain allowed access.
Do not audit attempts to read the process
state (/proc/pid) of all domains.
Domain allowed access.
Do not audit attempts to read the process state
directories of all domains.
Domain allowed access.
Get the session ID of all domains.
Domain allowed access.
Do not audit attempts to get the
session ID of all domains.
Domain allowed access.
Get the process group ID of all domains.
Domain allowed access.
Get the scheduler information of all domains.
Domain allowed access.
Get the attributes of all domains
sockets, for all socket types.
Get the attributes of all domains
sockets, for all socket types.
This is commonly used for domains
that can use lsof on all domains.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains sockets, for all socket types.
Do not audit attempts to get the attributes
of all domains sockets, for all socket types.
This interface was added for PCMCIA cardmgr
and is probably excessive.
Domain to not audit.
Do not audit attempts to get the attributes
of all domains TCP sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains UDP sockets.
Domain allowed access.
Do not audit attempts to read or write
all domains UDP sockets.
Domain allowed access.
Do not audit attempts to get attribues of
all domains IPSEC key management sockets.
Domain allowed access.
Do not audit attempts to get attribues of
all domains packet sockets.
Domain allowed access.
Do not audit attempts to get attribues of
all domains raw sockets.
Domain allowed access.
Do not audit attempts to read or write
all domains key sockets.
Domain allowed access.
Do not audit attempts to read or write
all domains key sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
Domain allowed access.
Get the attributes of all domains
unnamed pipes.
Get the attributes of all domains
unnamed pipes.
This is commonly used for domains
that can use lsof on all domains.
Domain allowed access.
Do not audit attempts to get the attributes
of all domains unnamed pipes.
Domain allowed access.
Allow specified type to set context of all
domains IPSEC associations.
Type of subject to be allowed this.
Get the attributes of entry point
files for all domains.
Domain allowed access.
Read the entry point files for all domains.
Domain allowed access.
Execute the entry point files for all
domains in the caller domain.
Domain allowed access.
dontaudit checking for execute on all entry point files
Domain to not audit.
Create, read, write, and delete all
entrypoint files.
Domain allowed access.
Relabel to and from all entry point
file types.
Domain allowed access.
Mmap all entry point files as executable.
Domain allowed access.
Execute an entry_type in the specified domain.
Domain allowed access.
The type of the new process.
Ability to mmap a low area of the address space,
as configured by /proc/sys/kernel/mmap_min_addr.
Preventing such mappings helps protect against
exploiting null deref bugs in the kernel.
Domain allowed to mmap low memory.
Ability to mmap a low area of the address space,
as configured by /proc/sys/kernel/mmap_min_addr.
Preventing such mappings helps protect against
exploiting null deref bugs in the kernel.
Domain allowed to mmap low memory.
Allow specified type to receive labeled
networking packets from all domains, over
all protocols (TCP, UDP, etc)
Domain allowed access.
Send generic signals to the unconfined domain.
Domain allowed access.
Unconfined access to domains.
Domain allowed access.
Do not audit attempts to read or write
all leaked sockets.
Domain allowed access.
Allow all domains to use other domains file descriptors
Allow all domains to have the kernel load modules
Allow all domains to execute in fips_mode
Basic filesystem types and interfaces.
This module contains basic filesystem types and interfaces. This
includes:
- The concept of different file types including basic
files, mount points, tmp files, etc.
- Access to groups of files and all files.
- Types and interfaces for the basic filesystem layout
(/, /etc, /tmp, /usr, etc.).
Contains the concept of a file.
Comains the file initial SID.
Make the specified type usable for files
in a filesystem.
Make the specified type usable for files
in a filesystem. Types used for files that
do not use this interface, or an interface that
calls this one, will have unexpected behaviors
while the system is running. If the type is used
for device nodes (character or block files), then
the dev_node() interface is more appropriate.
Related interfaces:
- application_domain()
- application_executable_file()
- corecmd_executable_file()
- init_daemon_domain()
- init_domaion()
- init_ranged_daemon_domain()
- init_ranged_domain()
- init_ranged_system_domain()
- init_script_file()
- init_script_domain()
- init_system_domain()
- files_config_files()
- files_lock_file()
- files_mountpoint()
- files_pid_file()
- files_security_file()
- files_security_mountpoint()
- files_tmp_file()
- files_tmpfs_file()
- logging_log_file()
- userdom_user_home_content()
Example:
type myfile_t;
files_type(myfile_t)
allow mydomain_t myfile_t:file read_file_perms;
Type to be used for files.
Make the specified type a file that
should not be dontaudited from
browsing from user domains.
Type of the file to be used as a
member directory.
Make the specified type usable for
lock files.
Type to be used for lock files.
Make the specified type usable for
lock files.
Type to be used for lock files.
Make the specified type usable for
filesystem mount points.
Type to be used for mount points.
Make the specified type usable for
security file filesystem mount points.
Type to be used for mount points.
Make the specified type usable for
runtime process ID files.
Make the specified type usable for runtime process ID files,
typically found in /var/run.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a PID file type may result in problems with starting
or stopping services.
Related interfaces:
Example usage with a domain that can create and
write its PID file with a private PID file type in the
/var/run directory:
type mypidfile_t;
files_pid_file(mypidfile_t)
allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
files_pid_filetrans(mydomain_t, mypidfile_t, file)
Type to be used for PID files.
Make the specified type a
configuration file.
Make the specified type usable for configuration files.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a temporary file may result in problems with
configuration management tools.
Example usage with a domain that can read
its configuration file /etc:
type myconffile_t;
files_config_file(myconffile_t)
allow mydomain_t myconffile_t:file read_file_perms;
files_search_etc(mydomain_t)
Type to be used as a configuration file.
Make the specified type a
base file.
Identify file type as base file type. Tools will use this attribute,
to help users diagnose problems.
Type to be used as a base files.
Make the specified type a
base read only file.
Make the specified type readable for all domains.
Type to be used as a base read only files.
Read all ro base files.
Domain allowed access.
Execute all base ro files.
Domain allowed access.
Make the specified type a
polyinstantiated directory.
Type of the file to be used as a
polyinstantiated directory.
Make the specified type a parent
of a polyinstantiated directory.
Type of the file to be used as a
parent directory.
Make the specified type a
polyinstantiation member directory.
Type of the file to be used as a
member directory.
Make the domain use the specified
type of polyinstantiated directory.
Domain using the polyinstantiated
directory.
Type of the file to be used as a
member directory.
Make the specified type a file
used for temporary files.
Make the specified type usable for temporary files.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a temporary file may result in problems with
purging temporary files.
Related interfaces:
Example usage with a domain that can create and
write its temporary file in the system temporary file
directories (/tmp or /var/tmp):
type mytmpfile_t;
files_tmp_file(mytmpfile_t)
allow mydomain_t mytmpfile_t:file { create_file_perms write_file_perms };
files_tmp_filetrans(mydomain_t, mytmpfile_t, file)
Type of the file to be used as a
temporary file.
Transform the type into a file, for use on a
virtual memory filesystem (tmpfs).
The type to be transformed.
Get the attributes of all directories.
Domain allowed access.
Do not audit attempts to get the attributes
of all directories.
Domain to not audit.
List all non-security directories.
Domain allowed access.
Do not audit attempts to list all
non-security directories.
Domain to not audit.
Mount a filesystem on all non-security
directories and files.
Domain allowed access.
Allow attempts to modify any directory
Domain to allow
Allow attempts to manage non-security directories
Domain to allow
Manage all non-security files.
Domain allowed access.
Relabel all non-security files.
Domain allowed access.
Search all base file dirs.
Domain allowed access.
Relabel all base file types.
Domain allowed access.
Get the attributes of all files.
Domain allowed access.
Do not audit attempts to get the attributes
of all files.
Domain to not audit.
Do not audit attempts to get the attributes
of non security files.
Domain to not audit.
Do not audit attempts to set the attributes
of non security files.
Domain to not audit.
Do not audit attempts to set the attributes
of non security directories.
Domain to not audit.
Read all files.
Domain allowed access.
Allow shared library text relocations in all files.
Allow shared library text relocations in all files.
This is added to support WINE policy.
Domain allowed access.
Read all non-security files.
Domain allowed access.
Read all directories on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read all files on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Read all symbolic links on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Get the attributes of all symbolic links.
Domain allowed access.
Do not audit attempts to get the attributes
of all symbolic links.
Domain to not audit.
Do not audit attempts to read all symbolic links.
Domain to not audit.
Do not audit attempts to get the attributes
of non security symbolic links.
Domain to not audit.
Do not audit attempts to get the attributes
of non security block devices.
Domain to not audit.
Do not audit attempts to get the attributes
of non security character devices.
Domain to not audit.
Read all symbolic links.
Domain allowed access.
Get the attributes of all named pipes.
Domain allowed access.
Do not audit attempts to get the attributes
of all named pipes.
Domain to not audit.
Do not audit attempts to get the attributes
of non security named pipes.
Domain to not audit.
Do not audit attempts to get the attributes
of non security named pipes.
Domain to not audit.
Get the attributes of all named sockets.
Domain allowed access.
Do not audit attempts to get the attributes
of all named sockets.
Domain to not audit.
Do not audit attempts to get the attributes
of non security named sockets.
Domain to not audit.
Read all block nodes with file types.
Domain allowed access.
Read all character nodes with file types.
Domain allowed access.
Relabel all files on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
rw all files on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Manage all files on the filesystem, except
the listed exceptions.
The type of the domain perfoming this action.
The types to be excluded. Each type or attribute
must be negated by the caller.
Search the contents of all directories on
extended attribute filesystems.
Domain allowed access.
List the contents of all directories on
extended attribute filesystems.
Domain allowed access.
Do not audit attempts to search the
contents of any directories on extended
attribute filesystems.
Domain allowed access.
Get the attributes of all filesystems
with the type of a file.
Domain allowed access.
Relabel a filesystem to the type of a file.
Domain allowed access.
Relabel a filesystem to the type of a file.
Domain allowed access.
Mount all filesystems with the type of a file.
Domain allowed access.
Unmount all filesystems with the type of a file.
Domain allowed access.
Manage all configuration directories on filesystem
The type of domain performing this action
Relabel configuration directories
Type of domain performing this action
Read config files in /etc.
Domain allowed access.
Manage all configuration files on filesystem
The type of domain performing this action
Relabel configuration files
Type of domain performing this action
Mount a filesystem on all mount points.
Domain allowed access.
Get the attributes of all mount points.
Domain allowed access.
Read all mountpoint symbolic links.
Domain allowed access.
List the attributes of all mount points.
Domain allowed access.
Get the attributes of all mount points.
Domain allowed access.
Do not audit listing of all mount points.
Domain to not audit.
Search all mount points.
Domain allowed access.
Search all mount points.
Domain allowed access.
Write all mount points.
Domain allowed access.
Write all mount points.
Domain allowed access.
List the contents of the root directory.
Domain allowed access.
Do not audit attempts to write
files in the root directory.
Domain allowed access.
Create an object in the root directory, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Do not audit attempts to read files in
the root directory.
Domain to not audit.
Do not audit attempts to read or write
files in the root directory.
Domain allowed access.
Do not audit attempts to read or write
character device nodes in the root directory.
Domain allowed access.
Remove file entries from the root directory.
Domain allowed access.
Remove entries from the root directory.
Domain allowed access.
Unmount a rootfs filesystem.
Domain allowed access.
Mount a filesystem on the root file system
Domain allowed access.
Get attributes of the /boot directory.
Domain allowed access.
Do not audit attempts to get attributes
of the /boot directory.
Domain to not audit.
Search the /boot directory.
Domain allowed access.
Do not audit attempts to search the /boot directory.
Domain allowed access.
List the /boot directory.
Domain allowed access.
Write directories in /boot
Domain allowed access.
Create directories in /boot
Domain allowed access.
manage directories in /boot
Domain allowed access.
Create a private type object in boot
with an automatic type transition
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
read files in the /boot directory.
Domain allowed access.
Create, read, write, and delete files
in the /boot directory.
Domain allowed access.
Create, read, write, and delete files
in the /boot directory.
Domain allowed access.
Relabel from files in the /boot directory.
Domain allowed access.
Read symbolic links
in the /boot directory.
Domain allowed access.
Read and write symbolic links
in the /boot directory.
Domain allowed access.
Create, read, write, and delete symbolic links
in the /boot directory.
Domain allowed access.
Read kernel files in the /boot directory.
Domain allowed access.
Install a kernel into the /boot directory.
Domain allowed access.
Delete a kernel from /boot.
Domain allowed access.
Getattr of directories with the default file type.
Domain allowed access.
Do not audit attempts to get the attributes of
directories with the default file type.
Domain to not audit.
Search the contents of directories with the default file type.
Domain allowed access.
List contents of directories with the default file type.
Domain allowed access.
Do not audit attempts to list contents of
directories with the default file type.
Domain to not audit.
Create, read, write, and delete directories with
the default file type.
Domain allowed access.
Mount a filesystem on a directory with the default file type.
Domain allowed access.
Do not audit attempts to get the attributes of
files with the default file type.
Domain to not audit.
Read files with the default file type.
Domain allowed access.
Do not audit attempts to read files
with the default file type.
Domain to not audit.
Create, read, write, and delete files with
the default file type.
Domain allowed access.
Read symbolic links with the default file type.
Domain allowed access.
Read sockets with the default file type.
Domain allowed access.
Read named pipes with the default file type.
Domain allowed access.
Search the contents of /etc directories.
Domain allowed access.
Set the attributes of the /etc directories.
Domain allowed access.
List the contents of /etc directories.
Domain allowed access.
Add and remove entries from /etc directories.
Domain allowed access.
Do not audit attempts to write to /etc dirs.
Domain allowed access.
Manage generic directories in /etc
Domain allowed access
Read generic files in /etc.
Allow the specified domain to read generic
files in /etc. These files are typically
general system configuration files that do
not have more specific SELinux types. Some
examples of these files are:
- /etc/fstab
- /etc/passwd
- /etc/services
- /etc/shells
This interface does not include access to /etc/shadow.
Generally, it is safe for many domains to have
this access. However, since this interface provides
access to the /etc/passwd file, caution must be
exercised, as user account names can be leaked
through this access.
Related interfaces:
- auth_read_shadow()
- files_read_etc_runtime_files()
- seutil_read_config()
Domain allowed access.
Do not audit attempts to write generic files in /etc.
Domain allowed access.
Read and write generic files in /etc.
Domain allowed access.
Create, read, write, and delete generic
files in /etc.
Domain allowed access.
Delete system configuration files in /etc.
Domain allowed access.
Delete system configuration lnk files in /etc.
Domain allowed access.
Remove entries from the etc directory.
Domain allowed access.
Execute generic files in /etc.
Domain allowed access.
Relabel from and to generic files in /etc.
Domain allowed access.
Read symbolic links in /etc.
Domain allowed access.
Create, read, write, and delete symbolic links in /etc.
Domain allowed access.
Create objects in /etc with a private
type using a type_transition.
Domain allowed access.
Private file type.
Object classes to be created.
Create a boot flag.
Create a boot flag, such as
/.autorelabel and /.autofsck.
Domain allowed access.
Read files in /etc that are dynamically
created on boot, such as mtab.
Allow the specified domain to read dynamically created
configuration files in /etc. These files are typically
general system configuration files that do
not have more specific SELinux types. Some
examples of these files are:
- /etc/motd
- /etc/mtab
- /etc/nologin
This interface does not include access to /etc/shadow.
Domain allowed access.
Do not audit attempts to read files
in /etc that are dynamically
created on boot, such as mtab.
Domain to not audit.
Read and write files in /etc that are dynamically
created on boot, such as mtab.
Domain allowed access.
Create, read, write, and delete files in
/etc that are dynamically created on boot,
such as mtab.
Domain allowed access.
Do not audit attempts to set the attributes of the etc_runtime files
Domain to not audit.
Create, etc runtime objects with an automatic
type transition.
Domain allowed access.
The class of the object being created.
Getattr of directories on new filesystems
that have not yet been labeled.
Domain allowed access.
Do not audit attempts to search directories on new filesystems
that have not yet been labeled.
Domain allowed access.
List the contents of directories on new filesystems
that have not yet been labeled.
Domain allowed access.
Read and write directories on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete directories on new filesystems
that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete directories
on new filesystems that have not yet been labeled.
Domain allowed access.
Mount a filesystem on a directory on new filesystems
that has not yet been labeled.
Domain allowed access.
Read files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete lnk_files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete fifo files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete sock files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete blk files on new filesystems
that have not yet been labeled.
Domain allowed access.
Delete chr files on new filesystems
that have not yet been labeled.
Domain allowed access.
Do not audit attempts to write to chr_files
that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete files
on new filesystems that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete symbolic links
on new filesystems that have not yet been labeled.
Domain allowed access.
Read and write block device nodes on new filesystems
that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete block device nodes
on new filesystems that have not yet been labeled.
Domain allowed access.
Create, read, write, and delete character device nodes
on new filesystems that have not yet been labeled.
Domain allowed access.
Get the attributes of the home directories root
(/home).
Domain allowed access.
Do not audit attempts to get the
attributes of the home directories root
(/home).
Domain to not audit.
Search home directories root (/home).
Domain allowed access.
Do not audit attempts to search
home directories root (/home).
Domain to not audit.
Do not audit attempts to list
home directories root (/home).
Domain to not audit.
Get listing of home directories.
Domain allowed access.
Relabel to user home root (/home).
Domain allowed access.
Create objects in /home.
Domain allowed access.
The private type.
The class of the object being created.
Get the attributes of lost+found directories.
Domain allowed access.
Do not audit attempts to get the attributes of
lost+found directories.
Domain to not audit.
Create, read, write, and delete objects in
lost+found directories.
Domain allowed access.
Search the contents of /mnt.
Domain allowed access.
Do not audit attempts to search /mnt.
Domain to not audit.
List the contents of /mnt.
Domain allowed access.
dontaudit List the contents of /mnt.
Domain allowed access.
Mount a filesystem on /mnt.
Domain allowed access.
Create, read, write, and delete directories in /mnt.
Domain allowed access.
Create, read, write, and delete files in /mnt.
Domain allowed access.
read files in /mnt.
Domain allowed access.
Read symbolic links in /mnt.
Domain allowed access.
Create, read, write, and delete symbolic links in /mnt.
Domain allowed access.
Search the contents of the kernel module directories.
Domain allowed access.
List the contents of the kernel module directories.
Domain allowed access.
Get the attributes of kernel module files.
Domain allowed access.
Read kernel module files.
Domain allowed access.
Write kernel module files.
Domain allowed access.
Delete kernel module files.
Domain allowed access.
Create, read, write, and delete
kernel module files.
Domain allowed access.
Relabel from and to kernel module files.
Domain allowed access.
Create objects in the kernel module directories
with a private type via an automatic type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
List world-readable directories.
Domain allowed access.
Read world-readable files.
Domain allowed access.
Read world-readable symbolic links.
Domain allowed access.
Read world-readable named pipes.
Domain allowed access.
Read world-readable sockets.
Domain allowed access.
Read manageable system configuration files in /etc
Domain allowed access.
Manage manageable system configuration files in /etc.
Domain allowed access.
Relabel manageable system configuration files in /etc.
Domain allowed access.
Relabel manageable system configuration files in /etc.
Domain allowed access.
Create files in /etc with the type used for
the manageable system config files.
The type of the process performing this action.
Allow the specified type to associate
to a filesystem with the type of the
temporary directory (/tmp).
Type of the file to associate.
Get the attributes of the tmp directory (/tmp).
Domain allowed access.
Do not audit attempts to get the
attributes of the tmp directory (/tmp).
Domain allowed access.
Search the tmp directory (/tmp).
Domain allowed access.
Do not audit attempts to search the tmp directory (/tmp).
Domain allowed access.
Read the tmp directory (/tmp).
Domain allowed access.
Do not audit listing of the tmp directory (/tmp).
Domain not to audit.
Dontaudit write to the tmp directory (/tmp).
Domain not to audit.
Allow read and write to the tmp directory (/tmp).
Domain not to audit.
Remove entries from the tmp directory.
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Read files in the tmp directory (/tmp).
Domain allowed access.
Manage temporary directories in /tmp.
The type of the process performing this action.
Allow shared library text relocations in tmp files.
Allow shared library text relocations in tmp files.
This is added to support java policy.
Domain allowed access.
Manage temporary files and directories in /tmp.
The type of the process performing this action.
Read symbolic links in the tmp directory (/tmp).
Domain allowed access.
Read and write generic named sockets in the tmp directory (/tmp).
Domain allowed access.
Relabel a dir from the type used in /tmp.
Domain allowed access.
Set the attributes of all tmp directories.
Domain allowed access.
Allow caller to read inherited tmp files.
Domain allowed access.
Allow caller to append inherited tmp files.
Domain allowed access.
Allow caller to read and write inherited tmp files.
Domain allowed access.
List all tmp directories.
Domain allowed access.
Do not audit attempts to get the attributes
of all tmp files.
Domain not to audit.
Allow attempts to get the attributes
of all tmp files.
Domain not to audit.
Do not audit attempts to get the attributes
of all tmp sock_file.
Domain not to audit.
Read all tmp files.
Domain allowed access.
Do not audit attempts to read or write
all leaked tmpfiles files.
Domain to not audit.
Create an object in the tmp directories, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Delete the contents of /tmp.
Domain allowed access.
Search the content of /etc.
Domain allowed access.
List the contents of generic
directories in /usr.
Domain allowed access.
Add and remove entries from /usr directories.
Domain allowed access.
dontaudit Add and remove entries from /usr directories.
Domain allowed access.
Delete generic directories in /usr in the caller domain.
Domain allowed access.
Set the attributes of the /usr directory.
Domain allowed access.
Delete generic files in /usr in the caller domain.
Domain allowed access.
Get the attributes of files in /usr.
Domain allowed access.
Read generic files in /usr.
Allow the specified domain to read generic
files in /usr. These files are various program
files that do not have more specific SELinux types.
Some examples of these files are:
- /usr/include/*
- /usr/share/doc/*
- /usr/share/info/*
Generally, it is safe for many domains to have
this access.
Domain allowed access.
Execute generic programs in /usr in the caller domain.
Domain allowed access.
dontaudit write of /usr dirs
Domain allowed access.
dontaudit write of /usr files
Domain allowed access.
Create, read, write, and delete files in the /usr directory.
Domain allowed access.
Relabel a file to the type used in /usr.
Domain allowed access.
Relabel a file from the type used in /usr.
Domain allowed access.
Read symbolic links in /usr.
Domain allowed access.
Create objects in the /usr directory
Domain allowed access.
The type of the object to be created
The object class.
Do not audit attempts to search /usr/src.
Domain to not audit.
Get the attributes of files in /usr/src.
Domain allowed access.
Read files in /usr/src.
Domain allowed access.
Execute programs in /usr/src in the caller domain.
Domain allowed access.
Install a system.map into the /boot directory.
Domain allowed access.
Read system.map in the /boot directory.
Domain allowed access.
Delete a system.map in the /boot directory.
Domain allowed access.
Search the contents of /var.
Domain allowed access.
Do not audit attempts to write to /var.
Domain to not audit.
Allow attempts to write to /var.dirs
Domain to not audit.
Do not audit attempts to search
the contents of /var.
Domain to not audit.
List the contents of /var.
Domain allowed access.
Do not audit listing of the var directory (/var).
Domain to not audit.
Create, read, write, and delete directories
in the /var directory.
Domain allowed access.
Read files in the /var directory.
Domain allowed access.
Read and write files in the /var directory.
Domain allowed access.
Do not audit attempts to read and write
files in the /var directory.
Domain allowed access.
Create, read, write, and delete files in the /var directory.
Domain allowed access.
Read symbolic links in the /var directory.
Domain allowed access.
Create, read, write, and delete symbolic
links in the /var directory.
Domain allowed access.
Create objects in the /var directory
Domain allowed access.
The type of the object to be created
The object class.
Get the attributes of the /var/lib directory.
Domain allowed access.
Search the /var/lib directory.
Search the /var/lib directory. This is
necessary to access files or directories under
/var/lib that have a private type. For example, a
domain accessing a private library file in the
/var/lib directory:
allow mydomain_t mylibfile_t:file read_file_perms;
files_search_var_lib(mydomain_t)
Domain allowed access.
List the contents of the /var/lib directory.
Domain allowed access.
Read-write /var/lib directories
Domain allowed access.
Read-write /var/lib directories
Domain allowed access.
Read-write /var/lib directories
Domain allowed access.
Create objects in the /var/lib directory
Domain allowed access.
The type of the object to be created
The object class.
Read generic files in /var/lib.
Domain allowed access.
Read generic symbolic links in /var/lib
Domain allowed access.
Create, read, write, and delete the
pseudorandom number generator seed.
Domain allowed access.
Allow domain to manage mount tables
necessary for rpcd, nfsd, etc.
Domain allowed access.
Search the locks directory (/var/lock).
Domain allowed access.
Do not audit attempts to search the
locks directory (/var/lock).
Domain to not audit.
Do not audit attempts to read/write inherited
locks (/var/lock).
Domain to not audit.
Do not audit attempts to read/write inherited
locks (/var/lock).
Domain to not audit.
Set the attributes of the /var/lock directory.
Domain allowed access.
Add and remove entries in the /var/lock
directories.
Domain allowed access.
Get the attributes of generic lock files.
Domain allowed access.
Create, read, write, and delete generic
lock files.
Domain allowed access.
Delete all lock files.
Domain allowed access.
Read all lock files.
Domain allowed access.
manage all lock files.
Domain allowed access.
Create an object in the locks directory, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Do not audit attempts to get the attributes
of the /var/run directory.
Domain to not audit.
Search the contents of runtime process
ID directories (/var/run).
Domain allowed access.
Do not audit attempts to search
the all /var/run directory.
Domain to not audit.
Add and remove entries from pid directories.
Domain allowed access.
Create generic pid directory.
Domain allowed access.
Do not audit attempts to search
the /var/run directory.
Domain to not audit.
List the contents of the runtime process
ID directories (/var/run).
Domain allowed access.
Read generic process ID files.
Domain allowed access.
Write named generic process ID pipes
Domain allowed access.
Create an object in the process ID directory, with a private type.
Create an object in the process ID directory (e.g., /var/run)
with a private type. Typically this is used for creating
private PID files in /var/run with the private type instead
of the general PID file type. To accomplish this goal,
either the program must be SELinux-aware, or use this interface.
Related interfaces:
Example usage with a domain that can create and
write its PID file with a private PID file type in the
/var/run directory:
type mypidfile_t;
files_pid_file(mypidfile_t)
allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
files_pid_filetrans(mydomain_t, mypidfile_t, file)
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Read and write generic process ID files.
Domain allowed access.
Do not audit attempts to get the attributes of
daemon runtime data files.
Domain allowed access.
Do not audit attempts to write to daemon runtime data files.
Domain allowed access.
Do not audit attempts to ioctl daemon runtime data files.
Domain allowed access.
Read all process ID files.
Domain allowed access.
Mount filesystems on all polyinstantiation
member directories.
Domain allowed access.
Delete all process IDs.
Domain allowed access.
Delete all process ID directories.
Domain allowed access.
Set the attributes of the /var/run directory.
Domain allowed access.
Search the contents of generic spool
directories (/var/spool).
Domain allowed access.
Do not audit attempts to search generic
spool directories.
Domain to not audit.
List the contents of generic spool
(/var/spool) directories.
Domain allowed access.
Create, read, write, and delete generic
spool directories (/var/spool).
Domain allowed access.
Read generic spool files.
Domain allowed access.
Create, read, write, and delete generic
spool files.
Domain allowed access.
Create objects in the spool directory
with a private type with a type transition.
Domain allowed access.
Type to which the created node will be transitioned.
Object class(es) (single or set including {}) for which this
the transition will occur.
Allow access to manage all polyinstantiated
directories on the system.
Domain allowed access.
Unconfined access to files.
Domain allowed access.
Create a core files in /
Create a core file in /,
Domain allowed access.
Create a default directory
Create a default_t direcrory
Domain allowed access.
Create, default_t objects with an automatic
type transition.
Domain allowed access.
The class of the object being created.
manage generic symbolic links
in the /var/run directory.
Domain allowed access.
Do not audit attempts to getattr
all tmpfs files.
Domain to not audit.
Do not audit attempts to read security files
Domain to not audit.
rw any files inherited from another process
Domain allowed access.
Object type.
Allow any file point to be the entrypoint of this domain
Domain allowed access.
Do not audit attempts to rw inherited file perms
of non security files.
Domain to not audit.
Do not audit attempts to read or write
all leaked files.
Domain allowed access.
Allow domain to create_file_ass all types
Domain allowed access.
Policy for filesystems.
Contains the initial SID for the filesystems.
Transform specified type into a filesystem type.
Domain allowed access.
Transform specified type into a filesystem
type which does not have extended attribute
support.
Domain allowed access.
Associate the specified file type to persistent
filesystems with extended attributes. This
allows a file of this type to be created on
a filesystem such as ext3, JFS, and XFS.
The type of the to be associated.
Associate the specified file type to
filesystems which lack extended attributes
support. This allows a file of this type
to be created on a filesystem such as
FAT32, and NFS.
The type of the to be associated.
Execute files on a filesystem that does
not support extended attributes.
Domain allowed access.
Mount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS.
Domain allowed access.
Remount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS. This allows
some mount options to be changed.
Domain allowed access.
Unmount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS.
Domain allowed access.
Get the attributes of persistent
filesystems which have extended
attributes, such as ext3, JFS, or XFS.
Allow the specified domain to
get the attributes of a persistent
filesystems which have extended
attributes, such as ext3, JFS, or XFS.
Example attributes:
- Type of the file system (e.g., ext3)
- Size of the file system
- Available space on the file system
Domain allowed access.
Do not audit attempts to
get the attributes of a persistent
filesystem which has extended
attributes, such as ext3, JFS, or XFS.
Domain to not audit.
Allow changing of the label of a
filesystem with extended attributes
using the context= mount option.
Domain allowed access.
Get the filesystem quotas of a filesystem
with extended attributes.
Domain allowed access.
Set the filesystem quotas of a filesystem
with extended attributes.
Domain allowed access.
Read files on anon_inodefs file systems.
Domain allowed access.
Read and write files on anon_inodefs
file systems.
Domain allowed access.
Do not audit attempts to read or write files on
anon_inodefs file systems.
Domain allowed access.
Mount an automount pseudo filesystem.
Domain allowed access.
Remount an automount pseudo filesystem
This allows some mount options to be changed.
Domain allowed access.
Unmount an automount pseudo filesystem.
Domain allowed access.
Get the attributes of an automount
pseudo filesystem.
Domain allowed access.
Search automount filesystem to use automatically
mounted filesystems.
Allow the specified domain to search mount points
that have filesystems that are mounted by
the automount service. Generally this will
be required for any domain that accesses objects
on these filesystems.
Domain allowed access.
Read directories of automatically
mounted filesystems.
Domain allowed access.
Do not audit attempts to list directories of automatically
mounted filesystems.
Domain to not audit.
Create, read, write, and delete symbolic links
on an autofs filesystem.
Domain allowed access.
Get the attributes of directories on
binfmt_misc filesystems.
Domain allowed access.
Register an interpreter for new binary
file types, using the kernel binfmt_misc
support.
Register an interpreter for new binary
file types, using the kernel binfmt_misc
support.
A common use for this is to
register a JVM as an interpreter for
Java byte code. Registered binaries
can be directly executed on a command line
without specifying the interpreter.
Domain allowed access.
Delete directories on cgroup.
Domain allowed access.
Mount a cgroup filesystem.
Domain allowed access.
Remount a cgroup filesystem This allows
some mount options to be changed.
Domain allowed access.
Unmount a cgroup file system.
Domain allowed access.
Get the attributes of a cgroup filesystem.
Domain allowed access.
Get attributes of cgroup files.
Domain allowed access.
Search cgroup directories.
Domain allowed access.
list dirs on cgroup
file systems.
Domain allowed access.
Manage dirs on cgroup file systems.
Domain allowed access.
Set attributes of files on cgroup
file systems.
Domain allowed access.
Read files on cgroup
file systems.
Domain allowed access.
Write files on cgroup
file systems.
Domain allowed access.
Read and write files on cgroup
file systems.
Domain allowed access.
Do not audit attempts to getattr,
open, read and write files on cgroup
file systems.
Domain to not audit.
Manage cgroup files.
Domain allowed access.
Mount on cgroup directories.
Domain allowed access.
Do not audit attempts to read
dirs on a CIFS or SMB filesystem.
Domain to not audit.
Mount a CIFS or SMB network filesystem.
Domain allowed access.
Remount a CIFS or SMB network filesystem.
This allows some mount options to be changed.
Domain allowed access.
Unmount a CIFS or SMB network filesystem.
Domain allowed access.
Get the attributes of a CIFS or
SMB network filesystem.
Domain allowed access.
Search directories on a CIFS or SMB filesystem.
Domain allowed access.
List the contents of directories on a
CIFS or SMB filesystem.
Domain allowed access.
Do not audit attempts to list the contents
of directories on a CIFS or SMB filesystem.
Domain to not audit.
Mounton a CIFS filesystem.
Domain allowed access.
Read files on a CIFS or SMB filesystem.
Domain allowed access.
Read files on a CIFS or SMB filesystem.
Domain allowed access.
Get the attributes of filesystems that
do not have extended attribute support.
Domain allowed access.
Read all noxattrfs directories.
Domain allowed access.
Create, read, write, and delete all noxattrfs directories.
Domain allowed access.
Read all noxattrfs files.
Domain allowed access.
Dont audit attempts to write to noxattrfs files.
Domain allowed access.
Read/Write all inherited noxattrfs files.
Domain allowed access.
Create noxattrfs files.
Domain allowed access.
Create, read, write, and delete all noxattrfs files.
Domain allowed access.
Read all noxattrfs symbolic links.
Domain allowed access.
Do not audit attempts to read
files on a CIFS or SMB filesystem.
Domain to not audit.
Append files
on a CIFS filesystem.
Domain allowed access.
dontaudit Append files
on a CIFS filesystem.
Domain allowed access.
Read inherited files on a CIFS or SMB filesystem.
Domain to not audit.
Read/Write inherited files on a CIFS or SMB filesystem.
Domain allowed access.
Do not audit attempts to read or
write files on a CIFS or SMB filesystem.
Domain to not audit.
Read symbolic links on a CIFS or SMB filesystem.
Domain allowed access.
Read named pipes
on a CIFS or SMB network filesystem.
Domain allowed access.
Read named pipes
on a CIFS or SMB network filesystem.
Domain allowed access.
Execute files on a CIFS or SMB
network filesystem, in the caller
domain.
Domain allowed access.
Create, read, write, and delete directories
on a CIFS or SMB network filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete directories
on a CIFS or SMB network filesystem.
Domain allowed access.
Create, read, write, and delete files
on a CIFS or SMB network filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete files
on a CIFS or SMB network filesystem.
Domain to not audit.
Create, read, write, and delete symbolic links
on a CIFS or SMB network filesystem.
Domain allowed access.
Create, read, write, and delete named pipes
on a CIFS or SMB network filesystem.
Domain allowed access.
Create, read, write, and delete named sockets
on a CIFS or SMB network filesystem.
Domain allowed access.
Execute a file on a CIFS or SMB filesystem
in the specified domain.
Execute a file on a CIFS or SMB filesystem
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
home directories on CIFS/SMB filesystems,
in particular used by the ssh-agent policy.
Domain allowed access.
The type of the new process.
Make general progams in cifs an entrypoint for
the specified domain.
The domain for which cifs_t is an entrypoint.
Create, read, write, and delete dirs
on a configfs filesystem.
Domain allowed access.
Create, read, write, and delete dirs
on a configfs filesystem.
Domain allowed access.
Create, read, write, and delete files
on a configfs filesystem.
Domain allowed access.
Mount a DOS filesystem, such as
FAT32 or NTFS.
Domain allowed access.
Remount a DOS filesystem, such as
FAT32 or NTFS. This allows
some mount options to be changed.
Domain allowed access.
Unmount a DOS filesystem, such as
FAT32 or NTFS.
Domain allowed access.
Get the attributes of a DOS
filesystem, such as FAT32 or NTFS.
Domain allowed access.
Allow changing of the label of a
DOS filesystem using the context= mount option.
Domain allowed access.
Search dosfs filesystem.
Domain allowed access.
List dirs DOS filesystem.
Domain allowed access.
Create, read, write, and delete dirs
on a DOS filesystem.
Domain allowed access.
Read files on a DOS filesystem.
Domain allowed access.
Create, read, write, and delete files
on a DOS filesystem.
Domain allowed access.
Read eventpollfs files.
Read eventpollfs files
This interface has been deprecated, and will
be removed in the future.
Domain allowed access.
Mount a FUSE filesystem.
Domain allowed access.
Unmount a FUSE filesystem.
Domain allowed access.
Mounton a FUSEFS filesystem.
Domain allowed access.
Execute a file on a FUSE filesystem
in the specified domain.
Execute a file on a FUSE filesystem
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
home directories on FUSE filesystems,
in particular used by the ssh-agent policy.
Domain allowed to transition.
The type of the new process.
Get the attributes of a FUSEFS filesystem.
Domain allowed access.
Search directories
on a FUSEFS filesystem.
Domain allowed access.
Do not audit attempts to list the contents
of directories on a FUSEFS filesystem.
Domain to not audit.
Create, read, write, and delete directories
on a FUSEFS filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete directories
on a FUSEFS filesystem.
Domain to not audit.
Read, a FUSEFS filesystem.
Domain allowed access.
Create, read, write, and delete files
on a FUSEFS filesystem.
Domain allowed access.
Execute files on a FUSEFS filesystem.
Domain allowed access.
Do not audit attempts to create,
read, write, and delete files
on a FUSEFS filesystem.
Domain to not audit.
Read symbolic links on a FUSEFS filesystem.
Domain allowed access.
Manage symbolic links on a FUSEFS filesystem.
Domain allowed access.
Get the attributes of an hugetlbfs
filesystem;
Domain allowed access.
Read hugetlbfs files.
Domain allowed access.
Read and write hugetlbfs files.
Domain allowed access.
Manage hugetlbfs dirs.
Domain allowed access.
List hugetlbfs dirs
Domain allowed access.
Allow the type to associate to hugetlbfs filesystems.
The type of the object to be associated.
Search inotifyfs filesystem.
Domain allowed access.
List inotifyfs filesystem.
Domain allowed access.
Dontaudit List inotifyfs filesystem.
Domain allowed access.
Create an object in a hugetlbfs filesystem, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Mount an iso9660 filesystem, which
is usually used on CDs.
Domain allowed access.
Remount an iso9660 filesystem, which
is usually used on CDs. This allows
some mount options to be changed.
Domain allowed access.
Unmount an iso9660 filesystem, which
is usually used on CDs.
Domain allowed access.
Get the attributes of an iso9660
filesystem, which is usually used on CDs.
Domain allowed access.
Read files on an iso9660 filesystem, which
is usually used on CDs.
Domain allowed access.
Read files on an iso9660 filesystem, which
is usually used on CDs.
Domain allowed access.
Mount a NFS filesystem.
Domain allowed access.
Remount a NFS filesystem. This allows
some mount options to be changed.
Domain allowed access.
Unmount a NFS filesystem.
Domain allowed access.
Get the attributes of a NFS filesystem.
Domain allowed access.
Search directories on a NFS filesystem.
Domain allowed access.
List NFS filesystem.
Domain allowed access.
Do not audit attempts to list the contents
of directories on a NFS filesystem.
Domain to not audit.
Mounton a NFS filesystem.
Domain allowed access.
Read files on a NFS filesystem.
Domain allowed access.
Do not audit attempts to read
files on a NFS filesystem.
Domain to not audit.
Read files on a NFS filesystem.
Domain allowed access.
Execute files on a NFS filesystem.
Domain allowed access.
Make general progams in nfs an entrypoint for
the specified domain.
The domain for which nfs_t is an entrypoint.
Append files
on a NFS filesystem.
Domain allowed access.
dontaudit Append files
on a NFS filesystem.
Domain allowed access.
Read inherited files on a NFS filesystem.
Domain to not audit.
Read/write inherited files on a NFS filesystem.
Domain allowed access.
Do not audit attempts to read or
write files on a NFS filesystem.
Domain to not audit.
Read symbolic links on a NFS filesystem.
Domain allowed access.
Dontaudit read symbolic links on a NFS filesystem.
Domain allowed access.
Read named sockets on a NFS filesystem.
Domain allowed access.
Read named pipes on a NFS network filesystem.
Domain allowed access.
Read directories of RPC file system pipes.
Domain allowed access.
Search directories of RPC file system pipes.
Domain allowed access.
Search removable storage directories.
Domain allowed access.
Do not audit attempts to list removable storage directories.
Domain not to audit.
Read removable storage files.
Domain allowed access.
Do not audit attempts to read removable storage files.
Domain not to audit.
Do not audit attempts to write removable storage files.
Domain not to audit.
Read removable storage symbolic links.
Domain allowed access.
Read and write block nodes on removable filesystems.
Domain allowed access.
Read directories of RPC file system pipes.
Domain allowed access.
Read files of RPC file system pipes.
Domain allowed access.
Read symbolic links of RPC file system pipes.
Domain allowed access.
Read sockets of RPC file system pipes.
Domain allowed access.
Read and write sockets of RPC file system pipes.
Domain allowed access.
Create, read, write, and delete directories
on a NFS filesystem.
Domain allowed access.
Set the attributes of nfs directories.
Domain allowed access.
Create, read, write, and delete directories
on a NFS filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete directories
on a NFS filesystem.
Domain to not audit.
Create, read, write, and delete files
on a NFS filesystem.
Domain allowed access.
Do not audit attempts to create,
read, write, and delete files
on a NFS filesystem.
Domain to not audit.
Create, read, write, and delete symbolic links
on a NFS network filesystem.
Domain allowed access.
Create, read, write, and delete named pipes
on a NFS filesystem.
Domain allowed access.
Create, read, write, and delete named sockets
on a NFS filesystem.
Domain allowed access.
Execute a file on a NFS filesystem
in the specified domain.
Execute a file on a NFS filesystem
in the specified domain. This allows
the specified domain to execute any file
on a NFS filesystem in the specified
domain. This is not suggested.
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
This interface was added to handle
home directories on NFS filesystems,
in particular used by the ssh-agent policy.
Domain allowed access.
The type of the new process.
Mount a NFS server pseudo filesystem.
Domain allowed access.
Mount a NFS server pseudo filesystem.
This allows some mount options to be changed.
Domain allowed access.
Unmount a NFS server pseudo filesystem.
Domain allowed access.
Get the attributes of a NFS server
pseudo filesystem.
Domain allowed access.
Search NFS server directories.
Domain allowed access.
List NFS server directories.
Domain allowed access.
Getattr files on an nfsd filesystem
Domain allowed access.
read files on an nfsd filesystem
Domain allowed access.
Read and write NFS server files.
Domain allowed access.
Allow the type to associate to ramfs filesystems.
The type of the object to be associated.
Mount a RAM filesystem.
Domain allowed access.
Remount a RAM filesystem. This allows
some mount options to be changed.
Domain allowed access.
Unmount a RAM filesystem.
Domain allowed access.
Get the attributes of a RAM filesystem.
Domain allowed access.
Search directories on a ramfs
Domain allowed access.
Dontaudit Search directories on a ramfs
Domain allowed access.
Create, read, write, and delete
directories on a ramfs.
Domain allowed access.
Dontaudit read on a ramfs files.
Domain allowed access.
Dontaudit read on a ramfs fifo_files.
Domain allowed access.
Create, read, write, and delete
files on a ramfs filesystem.
Domain allowed access.
Write to named pipe on a ramfs filesystem.
Domain allowed access.
Do not audit attempts to write to named
pipes on a ramfs filesystem.
Domain allowed access.
Read and write a named pipe on a ramfs filesystem.
Domain allowed access.
Create, read, write, and delete
named pipes on a ramfs filesystem.
Domain allowed access.
Write to named socket on a ramfs filesystem.
Domain allowed access.
Create, read, write, and delete
named sockets on a ramfs filesystem.
Domain allowed access.
Mount a ROM filesystem.
Domain allowed access.
Remount a ROM filesystem. This allows
some mount options to be changed.
Domain allowed access.
Unmount a ROM filesystem.
Domain allowed access.
Get the attributes of a ROM
filesystem.
Domain allowed access.
Mount a RPC pipe filesystem.
Domain allowed access.
Remount a RPC pipe filesystem. This
allows some mount option to be changed.
Domain allowed access.
Unmount a RPC pipe filesystem.
Domain allowed access.
Get the attributes of a RPC pipe
filesystem.
Domain allowed access.
Read and write RPC pipe filesystem named pipes.
Domain allowed access.
Mount a tmpfs filesystem.
Domain allowed access.
Remount a tmpfs filesystem.
Domain allowed access.
Unmount a tmpfs filesystem.
Domain allowed access.
Get the attributes of a tmpfs
filesystem.
Domain allowed access.
Allow the type to associate to tmpfs filesystems.
The type of the object to be associated.
Get the attributes of tmpfs directories.
Domain allowed access.
Do not audit attempts to get the attributes
of tmpfs directories.
Domain allowed access.
Set the attributes of tmpfs directories.
Domain allowed access.
Search tmpfs directories.
Domain allowed access.
List the contents of generic tmpfs directories.
Domain allowed access.
Do not audit attempts to list the
contents of generic tmpfs directories.
Domain to not audit.
Create, read, write, and delete
tmpfs directories
Domain allowed access.
Create an object in a tmpfs filesystem, with a private
type using a type transition.
Domain allowed access.
The type of the object to be created.
The object class of the object being created.
Do not audit attempts to getattr
generic tmpfs files.
Domain to not audit.
Do not audit attempts to read or write
generic tmpfs files.
Domain to not audit.
Read and write generic tmpfs files.
Domain allowed access.
Create, read, write, and delete
auto moutpoints.
Domain allowed access.
Read generic tmpfs files.
Domain allowed access.
Read and write generic tmpfs files.
Domain allowed access.
Delete generic tmpfs files.
Domain allowed access.
Read tmpfs link files.
Domain allowed access.
Read and write character nodes on tmpfs filesystems.
Domain allowed access.
dontaudit Read and write character nodes on tmpfs filesystems.
Domain allowed access.
dontaudit Read and write block nodes on tmpfs filesystems.
Domain allowed access.
Relabel character nodes on tmpfs filesystems.
Domain allowed access.
Read and write block nodes on tmpfs filesystems.
Domain allowed access.
Relabel block nodes on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete generic
files on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete symbolic
links on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete socket
files on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete character
nodes on tmpfs filesystems.
Domain allowed access.
Read and write, create and delete block nodes
on tmpfs filesystems.
Domain allowed access.
Mount a XENFS filesystem.
Domain allowed access.
Search the XENFS filesystem.
Domain allowed access.
Create, read, write, and delete directories
on a XENFS filesystem.
Domain allowed access.
Do not audit attempts to create, read,
write, and delete directories
on a XENFS filesystem.
Domain to not audit.
Create, read, write, and delete files
on a XENFS filesystem.
Domain allowed access.
Do not audit attempts to create,
read, write, and delete files
on a XENFS filesystem.
Domain to not audit.
Mount all filesystems.
Domain allowed access.
Remount all filesystems. This
allows some mount options to be changed.
Domain allowed access.
Unmount all filesystems.
Domain allowed access.
Get the attributes of all filesystems.
Allow the specified domain to
et the attributes of all filesystems.
Example attributes:
- Type of the file system (e.g., ext3)
- Size of the file system
- Available space on the file system
Domain allowed access.
Do not audit attempts to get the attributes
all filesystems.
Domain to not audit.
Get the quotas of all filesystems.
The type of the domain getting quotas.
Set the quotas of all filesystems.
The type of the domain setting quotas.
Relabelfrom all filesystems.
Domain allowed access.
Get the attributes of all directories
with a filesystem type.
Domain allowed access.
Search all directories with a filesystem type.
Domain allowed access.
List all directories with a filesystem type.
Domain allowed access.
Get the attributes of all files with
a filesystem type.
Domain allowed access.
Get the attributes of all symbolic links with
a filesystem type.
Domain allowed access.
Get the attributes of all named pipes with
a filesystem type.
Domain allowed access.
Get the attributes of all named sockets with
a filesystem type.
Domain allowed access.
Get the attributes of all blk files with
a filesystem type.
Domain allowed access.
Get the attributes of all chr files with
a filesystem type.
Domain allowed access.
Do not audit attempts to get the attributes
of all files with a filesystem type.
Domain allowed access.
Do not audit attempts to get the attributes
of all symbolic links with a filesystem type.
Domain allowed access.
Do not audit attempts to get the attributes
of all named pipes with a filesystem type.
Domain allowed access.
Do not audit attempts to get the attributes
of all named sockets with a filesystem type.
Domain allowed access.
Unconfined access to filesystems
Domain allowed access.
Relabel all objets from filesystems that
do not support extended attributes.
Domain allowed access.
Do not audit attempts to read or write
all leaked filesystems files.
Domain allowed access.
Policy for kernel threads, proc filesystem,
and unlabeled processes and objects.
This module has initial SIDs.
Allows to start userland processes
by transitioning to the specified domain.
The process type entered by kernel.
The executable type for the entrypoint.
Allows to start userland processes
by transitioning to the specified domain,
with a range transition.
The process type entered by kernel.
The executable type for the entrypoint.
Range for the domain.
Allows the kernel to mount filesystems on
the specified directory type.
The type of the directory to use as a mountpoint.
Set the process group of kernel threads.
Domain allowed access.
Set the priority of kernel threads.
Domain allowed access.
Send a SIGCHLD signal to kernel threads.
The type of the process sending the signal.
Send a kill signal to kernel threads.
The type of the process sending the signal.
Send a generic signal to kernel threads.
The type of the process sending the signal.
Send signull to kernel threads.
Domain allowed access.
Allows the kernel to share state information with
the caller.
The type of the process with which to share state information.
Permits caller to use kernel file descriptors.
The type of the process using the descriptors.
Do not audit attempts to use
kernel file descriptors.
The type of process not to audit.
Read and write kernel unnamed pipes.
Domain allowed access.
Read and write kernel unix datagram sockets.
Domain allowed access.
Send messages to kernel unix datagram sockets.
Domain allowed access.
Receive messages from kernel TCP sockets. (Deprecated)
Domain allowed access.
Send UDP network traffic to the kernel. (Deprecated)
Domain allowed access.
Receive messages from kernel UDP sockets. (Deprecated)
Domain allowed access.
Allows caller to load kernel modules
The process type to allow to load kernel modules.
Allow search the kernel key ring.
Domain allowed access.
dontaudit search the kernel key ring.
Domain allowed access.
Allow link to the kernel key ring.
Domain allowed access.
dontaudit link to the kernel key ring.
Domain allowed access.
Allows caller to read the ring buffer.
The process type allowed to read the ring buffer.
Do not audit attempts to read the ring buffer.
The domain to not audit.
Change the level of kernel messages logged to the console.
Domain allowed access.
Allows the caller to clear the ring buffer.
The process type clearing the buffer.
Allows caller to request the kernel to load a module
Allow the specified domain to request that the kernel
load a kernel module. An example of this is the
auto-loading of network drivers when doing an
ioctl() on a network interface.
In the specific case of a module loading request
on a network interface, the domain will also
need the net_admin capability.
Domain allowed access.
Dontaudit caller request the kernel to load a module
Allow the specified domain to request that the kernel
load a kernel module. An example of this is the
auto-loading of network drivers when doing an
ioctl() on a network interface.
In the specific case of a module loading request
on a network interface, the domain will also
need the net_admin capability.
Domain allowed access.
Get information on all System V IPC objects.
Domain allowed access.
Get the attributes of a kernel debugging filesystem.
Domain allowed access.
Mount a kernel debugging filesystem.
The type of the domain mounting the filesystem.
Unmount a kernel debugging filesystem.
The type of the domain unmounting the filesystem.
Remount a kernel debugging filesystem.
The type of the domain remounting the filesystem.
Search the contents of a kernel debugging filesystem.
Domain allowed access.
Do not audit attempts to search the kernel debugging filesystem.
Domain allowed access.
Read information from the debugging filesystem.
Domain allowed access.
Mount a kernel VM filesystem.
The type of the domain mounting the filesystem.
Unmount the proc filesystem.
The type of the domain unmounting the filesystem.
Get the attributes of the proc filesystem.
Domain allowed access.
Search directories in /proc.
Domain allowed access.
List the contents of directories in /proc.
Domain allowed access.
Do not audit attempts to list the
contents of directories in /proc.
Domain to not audit.
Get the attributes of files in /proc.
Domain allowed access.
Read generic symbolic links in /proc.
Allow the specified domain to read (follow) generic
symbolic links (symlinks) in the proc filesystem (/proc).
This interface does not include access to the targets of
these links. An example symlink is /proc/self.
Domain allowed access.
Allows caller to read system state information in /proc.
Allow the specified domain to read general system
state information from the proc filesystem (/proc).
Generally it should be safe to allow this access. Some
example files that can be read based on this interface:
- /proc/cpuinfo
- /proc/meminfo
- /proc/uptime
This does not allow access to sysctl entries (/proc/sys/*)
nor process state information (/proc/pid).
Domain allowed access.
Write to generic proc entries.
Domain allowed access.
Do not audit attempts by caller to
read system state information in proc.
The process type not to audit.
Allow caller to search virtual memory overcommit sysctls.
Domain allowed access.
Allow caller to read virtual memory overcommit sysctls.
Domain allowed access.
Read and write virtual memory overcommit sysctls.
Domain allowed access.
Allow searching of numa state directory.
Domain allowed access.
Do not audit attempts to search the numa
state directory.
Domain to not audit.
Allow caller to read the numa state information.
Domain allowed access.
Allow caller to read the numa state symbolic links.
Domain allowed access.
Allow caller to write numa state information.
Domain allowed access.
Do not audit attempts by caller to
read system state information in proc.
The process type not to audit.
Allow caller to read and write state information for AFS.
Domain allowed access.
Allow caller to read the state information for software raid.
The process type reading software raid state.
Allow caller to read and set the state information for software raid.
The process type reading software raid state.
Allows caller to get attribues of core kernel interface.
The process type getting the attibutes.
Do not audit attempts to get the attributes of
core kernel interfaces.
The process type to not audit.
Allows caller to read the core kernel interface.
Domain allowed access.
Allow caller to read kernel messages
using the /proc/kmsg interface.
The process type reading the messages.
Allow caller to get the attributes of kernel message
interface (/proc/kmsg).
The process type getting the attributes.
Do not audit attempts by caller to get the attributes of kernel
message interfaces.
The process type not to audit.
Do not audit attempts to search the network
state directory.
The process type reading the state.
Allow searching of network state directory.
The process type reading the state.
Read the network state information.
Allow the specified domain to read the networking
state information. This includes several pieces
of networking information, such as network interface
names, netfilter (iptables) statistics, protocol
information, routes, and remote procedure call (RPC)
information.
Domain allowed access.
Allow caller to read the network state symbolic links.
The process type reading the state.
Allow searching of xen state directory.
The process type reading the state.
Do not audit attempts to search the xen
state directory.
The process type reading the state.
Allow caller to read the xen state information.
The process type reading the state.
Allow caller to read the xen state symbolic links.
The process type reading the state.
Allow caller to write xen state information.
The process type writing the state.
Allow attempts to list all proc directories.
Domain to not audit.
Do not audit attempts to list all proc directories.
Domain to not audit.
Do not audit attempts by caller to search
the base directory of sysctls.
The process type not to audit.
Allow access to read sysctl directories.
The process type to allow to read sysctl directories.
Allow caller to read the device sysctls.
The process type to allow to read the device sysctls.
Read and write device sysctls.
Domain allowed access.
Allow caller to search virtual memory sysctls.
Domain allowed access.
Allow caller to read virtual memory sysctls.
Domain allowed access.
Read and write virtual memory sysctls.
Domain allowed access.
Search network sysctl directories.
Domain allowed access.
Do not audit attempts by caller to search network sysctl directories.
The process type not to audit.
Allow caller to read network sysctls.
Domain allowed access.
Allow caller to modiry contents of sysctl network files.
Domain allowed access.
Allow caller to read unix domain
socket sysctls.
Domain allowed access.
Read and write unix domain
socket sysctls.
Domain allowed access.
Read the hotplug sysctl.
Domain allowed access.
Read and write the hotplug sysctl.
Domain allowed access.
Read the modprobe sysctl.
Domain allowed access.
Read and write the modprobe sysctl.
Domain allowed access.
Do not audit attempts to search generic kernel sysctls.
Domain to not audit.
Read generic crypto sysctls.
Domain allowed access.
Read general kernel sysctls.
Allow the specified domain to read general
kernel sysctl settings. These settings are typically
read using the sysctl program. The settings
that are included by this interface are prefixed
with "kernel.", for example, kernel.sysrq.
This does not include access to the hotplug
handler setting (kernel.hotplug)
nor the module installer handler setting
(kernel.modprobe).
Related interfaces:
- kernel_rw_kernel_sysctl()
Domain allowed access.
Do not audit attempts to write generic kernel sysctls.
Domain to not audit.
Read and write generic kernel sysctls.
Domain allowed access.
Read filesystem sysctls.
Domain allowed access.
Read and write fileystem sysctls.
Domain allowed access.
Read IRQ sysctls.
Domain allowed access.
Read and write IRQ sysctls.
Domain allowed access.
Read RPC sysctls.
Domain allowed access.
Read and write RPC sysctls.
Domain allowed access.
Do not audit attempts to list all sysctl directories.
Domain to not audit.
Allow caller to read all sysctls.
Domain allowed access.
Read and write all sysctls.
Domain allowed access.
Send a kill signal to unlabeled processes.
Domain allowed access.
Mount a kernel unlabeled filesystem.
The type of the domain mounting the filesystem.
Unmount a kernel unlabeled filesystem.
Domain allowed access.
Send general signals to unlabeled processes.
Domain allowed access.
Send a null signal to unlabeled processes.
Domain allowed access.
Send a stop signal to unlabeled processes.
Domain allowed access.
Send a child terminated signal to unlabeled processes.
Domain allowed access.
List unlabeled directories.
Domain allowed access.
Read the process state (/proc/pid) of all unlabeled_t.
Domain allowed access.
Do not audit attempts to list unlabeled directories.
Domain allowed access.
Read and write unlabeled directories.
Domain allowed access.
Read and write unlabeled files.
Domain allowed access.
Do not audit attempts by caller to get the
attributes of an unlabeled file.
The process type not to audit.
Do not audit attempts by caller to
read an unlabeled file.
Domain to not audit.
Do not audit attempts by caller to get the
attributes of unlabeled symbolic links.
The process type not to audit.
Do not audit attempts by caller to get the
attributes of unlabeled named pipes.
The process type not to audit.
Do not audit attempts by caller to get the
attributes of unlabeled named sockets.
The process type not to audit.
Do not audit attempts by caller to get attributes for
unlabeled block devices.
The process type not to audit.
Read and write unlabeled block device nodes.
Domain allowed access.
Read and write unlabeled sockets.
Domain allowed access.
Do not audit attempts by caller to get attributes for
unlabeled character devices.
The process type not to audit.
Allow caller to relabel unlabeled directories.
Domain allowed access.
Allow caller to relabel unlabeled filesystems.
Domain allowed access.
Allow caller to relabel unlabeled files.
Domain allowed access.
Allow caller to relabel unlabeled symbolic links.
Domain allowed access.
Allow caller to relabel unlabeled named pipes.
Domain allowed access.
Allow caller to relabel unlabeled named sockets.
Domain allowed access.
Send and receive messages from an
unlabeled IPSEC association.
Send and receive messages from an
unlabeled IPSEC association. Network
connections that are not protected
by IPSEC have use an unlabeled
assocation.
The corenetwork interface
corenet_non_ipsec_sendrecv() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association.
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association. Network
connections that are not protected
by IPSEC have use an unlabeled
assocation.
The corenetwork interface
corenet_dontaudit_non_ipsec_sendrecv() should
be used instead of this one.
Domain to not audit.
Receive TCP packets from an unlabeled connection.
Receive TCP packets from an unlabeled connection.
The corenetwork interface corenet_tcp_recv_unlabeled() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to receive TCP packets from an unlabeled
connection.
Do not audit attempts to receive TCP packets from an unlabeled
connection.
The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled()
should be used instead of this one.
Domain to not audit.
Receive UDP packets from an unlabeled connection.
Receive UDP packets from an unlabeled connection.
The corenetwork interface corenet_udp_recv_unlabeled() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to receive UDP packets from an unlabeled
connection.
Do not audit attempts to receive UDP packets from an unlabeled
connection.
The corenetwork interface corenet_dontaudit_udp_recv_unlabeled()
should be used instead of this one.
Domain to not audit.
Receive Raw IP packets from an unlabeled connection.
Receive Raw IP packets from an unlabeled connection.
The corenetwork interface corenet_raw_recv_unlabeled() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
The corenetwork interface corenet_dontaudit_raw_recv_unlabeled()
should be used instead of this one.
Domain to not audit.
Read/Write Raw IP packets from an unlabeled connection.
Receive Raw IP packets from an unlabeled connection.
The corenetwork interface corenet_raw_recv_unlabeled() should
be used instead of this one.
Domain allowed access.
Send and receive unlabeled packets.
Send and receive unlabeled packets.
These packets do not match any netfilter
SECMARK rules.
The corenetwork interface
corenet_sendrecv_unlabeled_packets() should
be used instead of this one.
Domain allowed access.
Receive packets from an unlabeled peer.
Receive packets from an unlabeled peer, these packets do not have any
peer labeling information present.
The corenetwork interface corenet_recvfrom_unlabeled_peer() should
be used instead of this one.
Domain allowed access.
Do not audit attempts to receive packets from an unlabeled peer.
Do not audit attempts to receive packets from an unlabeled peer,
these packets do not have any peer labeling information present.
The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled()
should be used instead of this one.
Domain to not audit.
Relabel from unlabeled database objects.
Domain allowed access.
Relabel to unlabeled context .
Domain allowed access.
Unconfined access to kernel module resources.
Domain allowed access.
Allow the specified domain to read/write on
the kernel with a unix socket.
Domain allowed access.
Allow the specified domain to connect to
the kernel with a unix socket.
Domain allowed access.
Make the specified type usable for regular entries in proc
Type to be used for /proc entries.
Multicategory security policy
Contains attributes used in MCS policy.
This domain is allowed to read files and directories
regardless of their MCS category set.
Domain target for user exemption.
This domain is allowed to write files and directories
regardless of their MCS category set.
Domain target for user exemption.
This domain is allowed to sigkill and sigstop
all domains regardless of their MCS category set.
Domain target for user exemption.
This domain is allowed to ptrace
all domains regardless of their MCS
category set.
Domain target for user exemption.
Make specified domain MCS trusted
for setting any category set for
the processes it executes.
Domain target for user exemption.
Make specified process type MCS untrusted.
Make specified process type MCS untrusted. This
prevents this process from sending signals to other processes
with different mcs labels
object.
The type of the process.
Make specified domain MCS trusted
for writing to sockets at any level.
Domain allowed access.
Multilevel security policy
This module contains interfaces for handling multilevel
security. The interfaces allow the specified subjects
and objects to be allowed certain privileges in the
MLS rules.
Contains attributes used in MLS policy.
Make specified domain MLS trusted
for reading from files up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for reading from files at all levels. (Deprecated)
Make specified domain MLS trusted
for reading from files at all levels.
This interface has been deprecated, please use
mls_file_read_all_levels() instead.
Domain allowed access.
Make specified domain MLS trusted
for reading from files at all levels.
Domain allowed access.
Make specified domain MLS trusted
for write to files up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to files at all levels. (Deprecated)
Make specified domain MLS trusted
for writing to files at all levels.
This interface has been deprecated, please use
mls_file_write_all_levels() instead.
Domain allowed access.
Make specified domain MLS trusted
for writing to files at all levels.
Domain allowed access.
Make specified domain MLS trusted
for raising the level of files.
Domain allowed access.
Make specified domain MLS trusted
for lowering the level of files.
Domain allowed access.
Make specified domain trusted to
be written to within its MLS range.
The subject's MLS range must be a
proper subset of the object's MLS range.
Domain allowed access.
Make specified domain MLS trusted
for reading from sockets at any level.
Domain allowed access.
Make specified domain MLS trusted
for reading from sockets at any level
that is dominated by the process clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to sockets up to
its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to sockets at any level.
Domain allowed access.
Make specified domain MLS trusted
for receiving network data from
network interfaces or hosts at any level.
Domain allowed access.
Make specified domain trusted to
write to network objects within its MLS range.
The subject's MLS range must be a
proper subset of the object's MLS range.
Domain allowed access.
Make specified domain trusted to
write inbound packets regardless of the
network's or node's MLS range.
Domain allowed access.
Make specified domain trusted to
write outbound packets regardless of the
network's or node's MLS range.
Domain allowed access.
Make specified domain MLS trusted
for reading from System V IPC objects
up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for reading from System V IPC objects
at any level.
Domain allowed access.
Make specified domain MLS trusted
for writing to System V IPC objects
up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to System V IPC objects
at any level.
Domain allowed access.
Allow the specified domain to do a MLS
range transition that changes
the current level.
Domain allowed access.
Make specified domain a target domain
for MLS range transitions that change
the current level.
Domain allowed access.
Make specified domain MLS trusted
for reading from processes up to
its clearance.
Domain allowed access.
Make specified domain MLS trusted
for reading from processes at all levels. (Deprecated)
Make specified domain MLS trusted
for reading from processes at all levels.
This interface has been deprecated, please use
mls_process_read_all_levels() instead.
Domain allowed access.
Make specified domain MLS trusted
for reading from processes at all levels.
Domain allowed access.
Make specified domain MLS trusted
for writing to processes up to
its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to processes at all levels. (Deprecated)
Make specified domain MLS trusted
for writing to processes at all levels.
This interface has been deprecated, please use
mls_process_write_all_levels() instead.
Domain allowed access.
Make specified domain MLS trusted
for writing to processes at all levels.
Domain allowed access.
Make specified domain MLS trusted
for setting the level of processes
it executes.
Domain allowed access.
Make specified domain MLS trusted
for reading from X objects up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for reading from X objects at any level.
Domain allowed access.
Make specified domain MLS trusted
for write to X objects up to its clearance.
Domain allowed access.
Make specified domain MLS trusted
for writing to X objects at any level.
Domain allowed access.
Make specified domain MLS trusted
for reading from X colormaps at any level.
Domain allowed access.
Make specified domain MLS trusted
for writing to X colormaps at any level.
Domain allowed access.
Make specified object MLS trusted.
Make specified object MLS trusted. This
allows all levels to read and write the
object.
This currently only applies to filesystem
objects, for example, files and directories.
The type of the object.
Make the specified domain trusted
to inherit and use file descriptors
from all levels.
Domain allowed access.
Make the file descriptors from the
specifed domain inheritable by
all levels.
Domain allowed access.
Make specified domain MLS trusted
for translating contexts at all levels.
Domain allowed access.
Make specified domain MLS trusted
for reading from databases at any level.
Domain allowed access.
Make specified domain MLS trusted
for writing to databases at any level.
Domain allowed access.
Make specified domain MLS trusted
for raising the level of databases.
Domain allowed access.
Make specified domain MLS trusted
for lowering the level of databases.
Domain allowed access.
Make specified domain MLS trusted
for sending dbus messages to
all levels.
Domain allowed access.
Make specified domain MLS trusted
for receiving dbus messages from
all levels.
Domain allowed access.
Policy for kernel security interface, in particular, selinuxfs.
Contains the policy for the kernel SELinux security interface.
Make the specified type used for labeling SELinux Booleans.
This interface is only usable in the base module.
Make the specified type used for labeling SELinux Booleans.
This makes use of genfscon statements, which are only
available in the base module. Thus any module which calls this
interface must be included in the base module.
Type used for labeling a Boolean.
Name of the Boolean.
Get the mountpoint of the selinuxfs filesystem.
Domain allowed access.
Do not audit attempts to get the mountpoint
of the selinuxfs filesystem.
Domain to not audit.
Get the attributes of the selinuxfs filesystem
Domain allowed access.
Do not audit attempts to get the
attributes of the selinuxfs filesystem
Domain to not audit.
Do not audit attempts to get the
attributes of the selinuxfs directory.
Domain to not audit.
Search selinuxfs.
Domain allowed access.
Do not audit attempts to search selinuxfs.
Domain to not audit.
Do not audit attempts to read
generic selinuxfs entries
Domain to not audit.
Allows the caller to get the mode of policy enforcement
(enforcing or permissive mode).
The process type to allow to get the enforcing mode.
Allow caller to set the mode of policy enforcement
(enforcing or permissive mode).
Allow caller to set the mode of policy enforcement
(enforcing or permissive mode).
Since this is a security event, this action is
always audited.
The process type to allow to set the enforcement mode.
Allow caller to load the policy into the kernel.
The process type that will load the policy.
Allow caller to read the policy from the kernel.
Domain allowed access.
Allow caller to set the state of Booleans to
enable or disable conditional portions of the policy. (Deprecated)
Allow caller to set the state of Booleans to
enable or disable conditional portions of the policy.
Since this is a security event, this action is
always audited.
This interface has been deprecated. Please use
selinux_set_generic_booleans() or selinux_set_all_booleans()
instead.
The process type allowed to set the Boolean.
Allow caller to set the state of generic Booleans to
enable or disable conditional portions of the policy.
Allow caller to set the state of generic Booleans to
enable or disable conditional portions of the policy.
Since this is a security event, this action is
always audited.
The process type allowed to set the Boolean.
Allow caller to set the state of all Booleans to
enable or disable conditional portions of the policy.
Allow caller to set the state of all Booleans to
enable or disable conditional portions of the policy.
Since this is a security event, this action is
always audited.
The process type allowed to set the Boolean.
Allow caller to set SELinux access vector cache parameters.
Allow caller to set SELinux access vector cache parameters.
The allows the domain to set performance related parameters
of the AVC, such as cache threshold.
Since this is a security event, this action is
always audited.
The process type to allow to set security parameters.
Allows caller to validate security contexts.
The process type permitted to validate contexts.
Do not audit attempts to validate security contexts.
Domain to not audit.
Allows caller to compute an access vector.
The process type allowed to compute an access vector.
Calculate the default type for object creation.
Domain allowed access.
Allows caller to compute polyinstatntiated
directory members.
Domain allowed access.
Calculate the context for relabeling objects.
Calculate the context for relabeling objects.
This is determined by using the type_change
rules in the policy, and is generally used
for determining the context for relabeling
a terminal when a user logs in.
Domain allowed access.
Allows caller to compute possible contexts for a user.
The process type allowed to compute user contexts.
Unconfined access to the SELinux kernel security server.
Domain allowed access.
Generate a file context for a boolean type
Domain allowed access.
Policy controlling access to storage devices
Allow the caller to get the attributes of fixed disk
device nodes.
The type of the process performing this action.
Do not audit attempts made by the caller to get
the attributes of fixed disk device nodes.
The type of the process to not audit.
Allow the caller to set the attributes of fixed disk
device nodes.
The type of the process performing this action.
Do not audit attempts made by the caller to set
the attributes of fixed disk device nodes.
The type of the process to not audit.
Allow the caller to directly read from a fixed disk.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Do not audit attempts made by the caller to read
fixed disk device nodes.
The type of the process to not audit.
Allow the caller to directly write to a fixed disk.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Do not audit attempts made by the caller to write
fixed disk device nodes.
Domain to not audit.
Allow the caller to directly read and write to a fixed disk.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
Domain allowed access.
Allow the caller to create fixed disk device nodes.
Domain allowed access.
Allow the caller to create fixed disk device nodes.
Domain allowed access.
Create, read, write, and delete fixed disk device nodes.
The type of the process performing this action.
Create block devices in /dev with the fixed disk type
via an automatic type transition.
The type of the process performing this action.
Create block devices in on a tmpfs filesystem with the
fixed disk type via an automatic type transition.
The type of the process performing this action.
Relabel fixed disk device nodes.
The type of the process performing this action.
Enable a fixed disk device as swap space
The type of the process performing this action.
Allow the caller to get the attributes
of device nodes of fuse devices.
The type of the process performing this action.
read or write fuse device interfaces.
Domain to not audit.
Do not audit attempts to read or write
fuse device interfaces.
Domain to not audit.
Allow the caller to get the attributes of
the generic SCSI interface device nodes.
The type of the process performing this action.
Allow the caller to set the attributes of
the generic SCSI interface device nodes.
The type of the process performing this action.
Allow the caller to directly read, in a
generic fashion, from any SCSI device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Allow the caller to directly write, in a
generic fashion, from any SCSI device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Set attributes of the device nodes
for the SCSI generic inerface.
The type of the process performing this action.
Do not audit attempts to read or write
SCSI generic device interfaces.
Domain to not audit.
Allow the caller to get the attributes of removable
devices device nodes.
The type of the process performing this action.
Do not audit attempts made by the caller to get
the attributes of removable devices device nodes.
The type of the process to not audit.
Do not audit attempts made by the caller to read
removable devices device nodes.
The type of the process to not audit.
Do not audit attempts made by the caller to write
removable devices device nodes.
The type of the process to not audit.
Allow the caller to set the attributes of removable
devices device nodes.
The type of the process performing this action.
Do not audit attempts made by the caller to set
the attributes of removable devices device nodes.
The type of the process to not audit.
Allow the caller to directly read from
a removable device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Do not audit attempts to directly read removable devices.
Domain to not audit.
Allow the caller to directly write to
a removable device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
The type of the process performing this action.
Do not audit attempts to directly write removable devices.
Domain to not audit.
Allow the caller to directly read
a tape device.
The type of the process performing this action.
Allow the caller to directly read
a tape device.
The type of the process performing this action.
Allow the caller to get the attributes
of device nodes of tape devices.
The type of the process performing this action.
Allow the caller to set the attributes
of device nodes of tape devices.
The type of the process performing this action.
Unconfined access to storage devices.
Domain allowed access.
Policy for terminals.
Depended on by other required modules.
Transform specified type into a pty type.
An object type that will applied to a pty.
Transform specified type into an user
pty type. This allows it to be relabeled via
type change by login programs such as ssh.
The type of the user domain associated with
this pty.
An object type that will applied to a pty.
Transform specified type into a pty type
used by login programs, such as sshd.
An object type that will applied to a pty.
Transform specified type into a tty type.
An object type that will applied to a tty.
Transform specified type into a user tty type.
User domain that is related to this tty.
An object type that will applied to a tty.
Create a pty in the /dev/pts directory.
The type of the process creating the pty.
The type of the pty.
Write the console, all
ttys and all ptys.
Domain allowed access.
Read and write the console, all
ttys and all ptys.
Domain allowed access.
Write to the console.
Domain allowed access.
Read from the console.
Domain allowed access.
Do not audit attempts to read from the console.
Domain allowed access.
Read from and write to the console.
Domain allowed access.
Do not audit attemtps to read from
or write to the console.
Domain allowed access.
Set the attributes of the console
device node.
Domain allowed access.
Relabel from and to the console type.
Domain allowed access.
Relabel from and to the console type.
Domain allowed access.
Create the console device (/dev/console).
Domain allowed access.
Get the attributes of a pty filesystem
Domain allowed access.
Do not audit attempts to get the
attributes of the /dev/pts directory.
The type of the process to not audit.
Search the contents of the /dev/pts directory.
Domain allowed access.
Do not audit attempts to search the
contents of the /dev/pts directory.
Domain allowed access.
Read the /dev/pts directory to
list all ptys.
Domain allowed access.
Do not audit attempts to read the
/dev/pts directory.
The type of the process to not audit.
Do not audit attempts to create, read,
write, or delete the /dev/pts directory.
The type of the process to not audit.
Do not audit attempts to get the attributes
of generic pty devices.
The type of the process to not audit.
ioctl of generic pty devices.
Domain allowed access.
Allow setting the attributes of
generic pty devices.
Domain allowed access.
Dontaudit setting the attributes of
generic pty devices.
Domain allowed access.
Read and write the generic pty
type. This is generally only used in
the targeted policy.
Domain allowed access.
Dot not audit attempts to read and
write the generic pty type. This is
generally only used in the targeted policy.
The type of the process to not audit.
Set the attributes of the tty device
Domain allowed access.
Read and write the controlling
terminal (/dev/tty).
Domain allowed access.
Read and write the pty multiplexor (/dev/ptmx).
The type of the process to allow access.
Do not audit attempts to get attributes
on the pty multiplexor (/dev/ptmx).
The type of the process to not audit.
Do not audit attempts to read and
write the pty multiplexor (/dev/ptmx).
The type of the process to not audit.
Get the attributes of all
pty device nodes.
Domain allowed access.
Do not audit attempts to get the
attributes of any pty
device nodes.
Domain allowed access.
Set the attributes of all
pty device nodes.
Domain allowed access.
Relabel to all ptys.
Domain allowed access.
Write to all ptys.
Domain allowed access.
Read and write all ptys.
Domain allowed access.
Do not audit attempts to read or write any ptys.
Domain to not audit.
Relabel from and to all pty device nodes.
Domain allowed access.
Get the attributes of all user
pty device nodes. (Deprecated)
Domain allowed access.
Do not audit attempts to get the
attributes of any user pty
device nodes. (Deprecated)
Domain allowed access.
Set the attributes of all user
pty device nodes. (Deprecated)
Domain allowed access.
Relabel to all user ptys. (Deprecated)
Domain allowed access.
Write to all user ptys. (Deprecated)
Domain allowed access.
Read and write all user ptys. (Deprecated)
Domain allowed access.
Do not audit attempts to read any
user ptys. (Deprecated)
The type of the process to not audit.
Relabel from and to all user
user pty device nodes. (Deprecated)
Domain allowed access.
Get the attributes of all unallocated
tty device nodes.
Domain allowed access.
Do not audit attempts to get the attributes
of all unallocated tty device nodes.
Domain allowed access.
Set the attributes of all unallocated
tty device nodes.
Domain allowed access.
Do not audit attempts to set the attributes
of unallocated tty device nodes.
Domain allowed access.
Do not audit attempts to ioctl
unallocated tty device nodes.
Domain allowed access.
Relabel from and to the unallocated
tty type.
Domain allowed access.
Relabel from all user tty types to
the unallocated tty type.
Domain allowed access.
Append to unallocated ttys.
Domain allowed access.
Write to unallocated ttys.
Domain allowed access.
Read and write unallocated ttys.
Domain allowed access.
Do not audit attempts to read or
write unallocated ttys.
The type of the process to not audit.
Get the attributes of all tty device nodes.
Domain allowed access.
Do not audit attempts to get the
attributes of any tty device nodes.
Domain allowed access.
Set the attributes of all tty device nodes.
Domain allowed access.
Relabel from and to all tty device nodes.
Domain allowed access.
Write to all ttys.
Domain allowed access.
Read and write all ttys.
Domain allowed access.
Do not audit attempts to read or write
any ttys.
Domain allowed access.
Get the attributes of all user tty
device nodes. (Deprecated)
Domain allowed access.
Do not audit attempts to get the
attributes of any user tty
device nodes. (Deprecated)
Domain allowed access.
Set the attributes of all user tty
device nodes. (Deprecated)
Domain allowed access.
Relabel from and to all user
user tty device nodes. (Deprecated)
Domain allowed access.
Write to all user ttys. (Deprecated)
Domain allowed access.
Read and write all user to all user ttys. (Deprecated)
Domain allowed access.
Do not audit attempts to read or write
any user ttys. (Deprecated)
Domain allowed access.
Getattr on the virtio console.
Domain allowed access.
Read from and write to the virtio console.
Domain allowed access.
User-based access control policy
Contains attributes used in UBAC policy.
Constrain by user-based access control (UBAC).
Constrain the specified type by user-based
access control (UBAC). Typically, these are
user processes or user files that need to be
differentiated by SELinux user. Normally this
does not include administrative or privileged
programs. For the UBAC rules to be enforced,
both the subject (source) type and the object
(target) types must be UBAC constrained.
Type to be constrained by UBAC.
Exempt user-based access control for files.
Domain to be exempted.
Exempt user-based access control for processes.
Domain to be exempted.
Exempt user-based access control for file descriptors.
Domain to be exempted.
Exempt user-based access control for sockets.
Domain to be exempted.
Exempt user-based access control for SysV IPC.
Domain to be exempted.
Exempt user-based access control for X Windows.
Domain to be exempted.
Exempt user-based access control for dbus.
Domain to be exempted.
Exempt user-based access control for keys.
Domain to be exempted.
Exempt user-based access control for databases.
Domain to be exempted.
Policy for allowing confined domains to use unlabeled_t packets