Current File : //kunden/usr/share/selinux/devel/include/kernel.xml |
<summary>Policy modules for kernel resources.</summary>
<module name="corecommands" filename="policy/modules/kernel/corecommands.if">
<summary>
Core policy for shells, and generic programs
in /bin, /sbin, /usr/bin, and /usr/sbin.
</summary>
<required val="true">
Contains the base bin and sbin directory types
which need to be searched for the kernel to
run init.
</required>
<interface name="corecmd_stub_bin" lineno="21">
<summary>
corecmd stub bin_t interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="corecmd_executable_file" lineno="39">
<summary>
Make the specified type usable for files
that are exectuables, such as binary programs.
This does not include shared libraries.
</summary>
<param name="type">
<summary>
Type to be used for files.
</summary>
</param>
</interface>
<interface name="corecmd_bin_alias" lineno="69">
<summary>
Create a aliased type to generic bin files. (Deprecated)
</summary>
<desc>
<p>
Create a aliased type to generic bin files. (Deprecated)
</p>
<p>
This is added to support targeted policy. Its
use should be limited. It has no effect
on the strict policy.
</p>
</desc>
<param name="domain">
<summary>
Alias type for bin_t.
</summary>
</param>
</interface>
<interface name="corecmd_bin_entry_type" lineno="84">
<summary>
Make general progams in bin an entrypoint for
the specified domain.
</summary>
<param name="domain">
<summary>
The domain for which bin_t is an entrypoint.
</summary>
</param>
</interface>
<interface name="corecmd_sbin_entry_type" lineno="105">
<summary>
Make general progams in sbin an entrypoint for
the specified domain. (Deprecated)
</summary>
<param name="domain">
<summary>
The domain for which sbin programs are an entrypoint.
</summary>
</param>
</interface>
<interface name="corecmd_shell_entry_type" lineno="120">
<summary>
Make the shell an entrypoint for the specified domain.
</summary>
<param name="domain">
<summary>
The domain for which the shell is an entrypoint.
</summary>
</param>
</interface>
<interface name="corecmd_search_bin" lineno="138">
<summary>
Search the contents of bin directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_dontaudit_search_bin" lineno="157">
<summary>
Do not audit attempts to search the contents of bin directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_list_bin" lineno="175">
<summary>
List the contents of bin directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_dontaudit_write_bin_dirs" lineno="194">
<summary>
Do not audit attempts to write bin directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_watch_bin_dirs" lineno="212">
<summary>
Watch bin directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_getattr_bin_files" lineno="230">
<summary>
Get the attributes of files in bin directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_dontaudit_getattr_bin_files" lineno="248">
<summary>
Get the attributes of files in bin directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_read_bin_files" lineno="267">
<summary>
Read files in bin directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_dontaudit_write_bin_files" lineno="286">
<summary>
Do not audit attempts to write bin files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_dontaudit_access_check_bin" lineno="304">
<summary>
Do not audit attempts to access check bin files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_read_bin_symlinks" lineno="322">
<summary>
Read symbolic links in bin directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_read_bin_pipes" lineno="340">
<summary>
Read pipes in bin directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_read_bin_sockets" lineno="359">
<summary>
Read named sockets in bin directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_exec_bin" lineno="399">
<summary>
Execute generic programs in bin directories,
in the caller domain.
</summary>
<desc>
<p>
Allow the specified domain to execute generic programs
in system bin directories (/bin, /sbin, /usr/bin,
/usr/sbin) a without domain transition.
</p>
<p>
Typically, this interface should be used when the domain
executes general system progams within the privileges
of the source domain. Some examples of these programs
are ls, cp, sed, python, and tar. This does not include
shells, such as bash.
</p>
<p>
Related interface:
</p>
<ul>
<li>corecmd_exec_shell()</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_manage_bin_files" lineno="423">
<summary>
Create, read, write, and delete bin files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_relabel_bin_files" lineno="442">
<summary>
Relabel to and from the bin type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_mmap_bin_files" lineno="460">
<summary>
Mmap a bin file as executable.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_bin_spec_domtrans" lineno="505">
<summary>
Execute a file in a bin directory
in the specified domain but do not
do it automatically. This is an explicit
transition, requiring the caller to use setexeccon().
</summary>
<desc>
<p>
Execute a file in a bin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
<p>
This interface was added to handle
the userhelper policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="corecmd_bin_domtrans" lineno="552">
<summary>
Execute a file in a bin directory
in the specified domain.
</summary>
<desc>
<p>
Execute a file in a bin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
<p>
This interface was added to handle
the ssh-agent policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="corecmd_search_sbin" lineno="573">
<summary>
Search the contents of sbin directories. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_dontaudit_search_sbin" lineno="589">
<summary>
Do not audit attempts to search
sbin directories. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_list_sbin" lineno="604">
<summary>
List the contents of sbin directories. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_dontaudit_write_sbin_dirs" lineno="620">
<summary>
Do not audit attempts to write
sbin directories. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_getattr_sbin_files" lineno="635">
<summary>
Get the attributes of sbin files. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_dontaudit_getattr_sbin_files" lineno="651">
<summary>
Do not audit attempts to get the attibutes
of sbin files. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_read_sbin_files" lineno="666">
<summary>
Read files in sbin directories. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_read_sbin_symlinks" lineno="681">
<summary>
Read symbolic links in sbin directories. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_read_sbin_pipes" lineno="696">
<summary>
Read named pipes in sbin directories. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_read_sbin_sockets" lineno="711">
<summary>
Read named sockets in sbin directories. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_exec_sbin" lineno="727">
<summary>
Execute generic programs in sbin directories,
in the caller domain. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_manage_sbin_files" lineno="743">
<summary>
Create, read, write, and delete sbin files. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_relabel_sbin_files" lineno="759">
<summary>
Relabel to and from the sbin type. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_mmap_sbin_files" lineno="775">
<summary>
Mmap a sbin file as executable. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_sbin_domtrans" lineno="814">
<summary>
Execute a file in a sbin directory
in the specified domain. (Deprecated)
</summary>
<desc>
<p>
Execute a file in a sbin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested. (Deprecated)
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
<p>
This interface was added to handle
the ssh-agent policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="corecmd_sbin_spec_domtrans" lineno="855">
<summary>
Execute a file in a sbin directory
in the specified domain but do not
do it automatically. This is an explicit
transition, requiring the caller to use setexeccon(). (Deprecated)
</summary>
<desc>
<p>
Execute a file in a sbin directory
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested. (Deprecated)
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
<p>
This interface was added to handle
the userhelper policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="corecmd_check_exec_shell" lineno="870">
<summary>
Check if a shell is executable (DAC-wise).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_exec_shell" lineno="908">
<summary>
Execute shells in the caller domain.
</summary>
<desc>
<p>
Allow the specified domain to execute shells without
a domain transition.
</p>
<p>
Typically, this interface should be used when the domain
executes shells within the privileges
of the source domain. Some examples of these programs
are bash, tcsh, and zsh.
</p>
<p>
Related interface:
</p>
<ul>
<li>corecmd_exec_bin()</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_exec_ls" lineno="929">
<summary>
Execute ls in the caller domain. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_shell_spec_domtrans" lineno="963">
<summary>
Execute a shell in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
</summary>
<desc>
<p>
Execute a shell in the target domain. This
is an explicit transition, requiring the
caller to use setexeccon().
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the shell process.
</summary>
</param>
</interface>
<interface name="corecmd_shell_domtrans" lineno="998">
<summary>
Execute a shell in the specified domain.
</summary>
<desc>
<p>
Execute a shell in the specified domain.
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the shell process.
</summary>
</param>
</interface>
<interface name="corecmd_exec_chroot" lineno="1017">
<summary>
Execute chroot in the caller domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_dontaudit_access_all_executables" lineno="1038">
<summary>
Do not audit attempts to access check executable files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_getattr_all_executables" lineno="1057">
<summary>
Get the attributes of all executable files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="corecmd_exec_all_executables" lineno="1078">
<summary>
Execute all executable files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="corecmd_dontaudit_exec_all_executables" lineno="1099">
<summary>
Do not audit attempts to execute all executables.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corecmd_manage_all_executables" lineno="1118">
<summary>
Create, read, write, and all executable files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="corecmd_relabel_all_executables" lineno="1140">
<summary>
Relabel to and from the bin type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="corecmd_mmap_all_executables" lineno="1159">
<summary>
Mmap all executables as executable.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corecmd_read_all_executables" lineno="1179">
<summary>
Read all executable files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="corecmd_entrypoint_all_executables" lineno="1198">
<summary>
Read all executable files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="corecmd_bin_filetrans" lineno="1231">
<summary>
Create objects in the /bin directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="file_type">
<summary>
The type of the object to be created
</summary>
</param>
<param name="object_class">
<summary>
The object class.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
</module>
<module name="corenetwork" filename="policy/modules/kernel/corenetwork.if">
<summary>Policy controlling access to network objects</summary>
<required val="true">
Contains the initial SIDs for network objects.
</required>
<interface name="corenet_port" lineno="29">
<summary>
Define type to be a network port type
</summary>
<desc>
<p>
Define type to be a network port type
</p>
<p>
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
</p>
</desc>
<param name="domain">
<summary>
Type to be used for network ports.
</summary>
</param>
</interface>
<interface name="corenet_reserved_port" lineno="56">
<summary>
Define network type to be a reserved port (lt 1024)
</summary>
<desc>
<p>
Define network type to be a reserved port (lt 1024)
</p>
<p>
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
</p>
</desc>
<param name="domain">
<summary>
Type to be used for network ports.
</summary>
</param>
</interface>
<interface name="corenet_rpc_port" lineno="84">
<summary>
Define network type to be a rpc port ( 512 lt PORT lt 1024)
</summary>
<desc>
<p>
Define network type to be a rpc port ( 512 lt PORT lt 1024)
</p>
<p>
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
</p>
</desc>
<param name="domain">
<summary>
Type to be used for network ports.
</summary>
</param>
</interface>
<interface name="corenet_node" lineno="112">
<summary>
Define type to be a network node type
</summary>
<desc>
<p>
Define type to be a network node type
</p>
<p>
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
</p>
</desc>
<param name="domain">
<summary>
Type to be used for network nodes.
</summary>
</param>
</interface>
<interface name="corenet_packet" lineno="139">
<summary>
Define type to be a network packet type
</summary>
<desc>
<p>
Define type to be a network packet type
</p>
<p>
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
</p>
</desc>
<param name="domain">
<summary>
Type to be used for a network packet.
</summary>
</param>
</interface>
<interface name="corenet_client_packet" lineno="166">
<summary>
Define type to be a network client packet type
</summary>
<desc>
<p>
Define type to be a network client packet type
</p>
<p>
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
</p>
</desc>
<param name="domain">
<summary>
Type to be used for a network client packet.
</summary>
</param>
</interface>
<interface name="corenet_server_packet" lineno="193">
<summary>
Define type to be a network server packet type
</summary>
<desc>
<p>
Define type to be a network server packet type
</p>
<p>
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
</p>
</desc>
<param name="domain">
<summary>
Type to be used for a network server packet.
</summary>
</param>
</interface>
<interface name="corenet_spd_type" lineno="212">
<summary>
Make the specified type usable
for labeled ipsec.
</summary>
<param name="domain">
<summary>
Type to be used for labeled ipsec.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_generic_if" lineno="258">
<summary>
Send and receive TCP network traffic on generic interfaces.
</summary>
<desc>
<p>
Allow the specified domain to send and receive TCP network
traffic on generic network interfaces.
</p>
<p>
Related interface:
</p>
<ul>
<li>corenet_all_recvfrom_unlabeled()</li>
<li>corenet_tcp_sendrecv_generic_node()</li>
<li>corenet_tcp_sendrecv_all_ports()</li>
<li>corenet_tcp_connect_all_ports()</li>
</ul>
<p>
Example client being able to connect to all ports over
generic nodes, without labeled networking:
</p>
<p>
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_generic_if" lineno="276">
<summary>
Send UDP network traffic on generic interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_send_generic_if" lineno="295">
<summary>
Dontaudit attempts to send UDP network traffic
on generic interfaces.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_udp_receive_generic_if" lineno="313">
<summary>
Receive UDP network traffic on generic interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_receive_generic_if" lineno="332">
<summary>
Do not audit attempts to receive UDP network
traffic on generic interfaces.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_udp_sendrecv_generic_if" lineno="376">
<summary>
Send and receive UDP network traffic on generic interfaces.
</summary>
<desc>
<p>
Allow the specified domain to send and receive UDP network
traffic on generic network interfaces.
</p>
<p>
Related interface:
</p>
<ul>
<li>corenet_all_recvfrom_unlabeled()</li>
<li>corenet_udp_sendrecv_generic_node()</li>
<li>corenet_udp_sendrecv_all_ports()</li>
</ul>
<p>
Example client being able to send to all ports over
generic nodes, without labeled networking:
</p>
<p>
allow myclient_t self:udp_socket create_socket_perms;
corenet_udp_sendrecv_generic_if(myclient_t)
corenet_udp_sendrecv_generic_node(myclient_t)
corenet_udp_sendrecv_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_generic_if" lineno="392">
<summary>
Do not audit attempts to send and receive UDP network
traffic on generic interfaces.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_raw_send_generic_if" lineno="407">
<summary>
Send raw IP packets on generic interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_receive_generic_if" lineno="425">
<summary>
Receive raw IP packets on generic interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_sendrecv_generic_if" lineno="443">
<summary>
Send and receive raw IP packets on generic interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_out_generic_if" lineno="459">
<summary>
Allow outgoing network traffic on the generic interfaces.
</summary>
<param name="domain">
<summary>
The peer label of the outgoing network traffic.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_in_generic_if" lineno="478">
<summary>
Allow incoming traffic on the generic interfaces.
</summary>
<param name="domain">
<summary>
The peer label of the incoming network traffic.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_inout_generic_if" lineno="497">
<summary>
Allow incoming and outgoing network traffic on the generic interfaces.
</summary>
<param name="domain">
<summary>
The peer label of the network traffic.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_tcp_sendrecv_all_if" lineno="512">
<summary>
Send and receive TCP network traffic on all interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_send_all_if" lineno="530">
<summary>
Send UDP network traffic on all interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_receive_all_if" lineno="548">
<summary>
Receive UDP network traffic on all interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_sendrecv_all_if" lineno="566">
<summary>
Send and receive UDP network traffic on all interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_send_all_if" lineno="581">
<summary>
Send raw IP packets on all interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_sendrecv_generic_node" lineno="599">
<summary>
Send and receive SCTP network traffic on generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_receive_all_if" lineno="617">
<summary>
Receive raw IP packets on all interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_sendrecv_all_if" lineno="635">
<summary>
Send and receive raw IP packets on all interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_sendrecv_generic_node" lineno="650">
<summary>
Send and receive DCCP network traffic on generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_generic_node" lineno="696">
<summary>
Send and receive TCP network traffic on generic nodes.
</summary>
<desc>
<p>
Allow the specified domain to send and receive TCP network
traffic to/from generic network nodes (hostnames/networks).
</p>
<p>
Related interface:
</p>
<ul>
<li>corenet_all_recvfrom_unlabeled()</li>
<li>corenet_tcp_sendrecv_generic_if()</li>
<li>corenet_tcp_sendrecv_all_ports()</li>
<li>corenet_tcp_connect_all_ports()</li>
</ul>
<p>
Example client being able to connect to all ports over
generic nodes, without labeled networking:
</p>
<p>
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_generic_node" lineno="714">
<summary>
Send UDP network traffic on generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_receive_generic_node" lineno="732">
<summary>
Receive UDP network traffic on generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_sendrecv_generic_node" lineno="776">
<summary>
Send and receive UDP network traffic on generic nodes.
</summary>
<desc>
<p>
Allow the specified domain to send and receive UDP network
traffic to/from generic network nodes (hostnames/networks).
</p>
<p>
Related interface:
</p>
<ul>
<li>corenet_all_recvfrom_unlabeled()</li>
<li>corenet_udp_sendrecv_generic_if()</li>
<li>corenet_udp_sendrecv_all_ports()</li>
</ul>
<p>
Example client being able to send to all ports over
generic nodes, without labeled networking:
</p>
<p>
allow myclient_t self:udp_socket create_socket_perms;
corenet_udp_sendrecv_generic_if(myclient_t)
corenet_udp_sendrecv_generic_node(myclient_t)
corenet_udp_sendrecv_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_raw_send_generic_node" lineno="791">
<summary>
Send raw IP packets on generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_receive_generic_node" lineno="809">
<summary>
Receive raw IP packets on generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_sendrecv_generic_node" lineno="827">
<summary>
Send and receive raw IP packets on generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_bind_generic_node" lineno="842">
<summary>
Bind DCCP sockets to generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_bind_generic_node" lineno="860">
<summary>
Bind SCTP sockets to generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_icmp_bind_generic_node" lineno="878">
<summary>
Bind ICMP sockets to generic nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_generic_node" lineno="911">
<summary>
Bind TCP sockets to generic nodes.
</summary>
<desc>
<p>
Bind TCP sockets to generic nodes. This is
necessary for binding a socket so it
can be used for servers to listen
for incoming connections.
</p>
<p>
Related interface:
</p>
<ul>
<li>corenet_udp_bind_generic_node()</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="1"/>
</interface>
<interface name="corenet_udp_bind_generic_node" lineno="944">
<summary>
Bind UDP sockets to generic nodes.
</summary>
<desc>
<p>
Bind UDP sockets to generic nodes. This is
necessary for binding a socket so it
can be used for servers to listen
for incoming connections.
</p>
<p>
Related interface:
</p>
<ul>
<li>corenet_tcp_bind_generic_node()</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="1"/>
</interface>
<interface name="corenet_dontaudit_tcp_bind_generic_node" lineno="963">
<summary>
Dontaudit attempts to bind TCP sockets to generic nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="read" weight="1"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_generic_node" lineno="982">
<summary>
Dontaudit attempts to bind UDP sockets to generic nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="read" weight="1"/>
</interface>
<interface name="corenet_raw_bind_generic_node" lineno="1001">
<summary>
Bind raw sockets to genric nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_out_generic_node" lineno="1020">
<summary>
Allow outgoing network traffic to generic nodes.
</summary>
<param name="domain">
<summary>
The peer label of the outgoing network traffic.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_in_generic_node" lineno="1039">
<summary>
Allow incoming network traffic from generic nodes.
</summary>
<param name="domain">
<summary>
The peer label of the incoming network traffic.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_inout_generic_node" lineno="1058">
<summary>
Allow incoming and outgoing network traffic with generic nodes.
</summary>
<param name="domain">
<summary>
The peer label of the network traffic.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dccp_sendrecv_all_nodes" lineno="1073">
<summary>
Send and receive DCCP network traffic on all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_all_nodes" lineno="1091">
<summary>
Send and receive TCP network traffic on all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_send_all_nodes" lineno="1109">
<summary>
Send UDP network traffic on all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_send_all_nodes" lineno="1128">
<summary>
Do not audit attempts to send UDP network
traffic on any nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_sctp_sendrecv_all_nodes" lineno="1146">
<summary>
Send and receive SCTP network traffic on all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_receive_all_nodes" lineno="1164">
<summary>
Receive UDP network traffic on all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_receive_all_nodes" lineno="1183">
<summary>
Do not audit attempts to receive UDP
network traffic on all nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_udp_sendrecv_all_nodes" lineno="1201">
<summary>
Send and receive UDP network traffic on all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_all_nodes" lineno="1217">
<summary>
Do not audit attempts to send and receive UDP
network traffic on any nodes nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_raw_send_all_nodes" lineno="1232">
<summary>
Send raw IP packets on all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_receive_all_nodes" lineno="1250">
<summary>
Receive raw IP packets on all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_sendrecv_all_nodes" lineno="1268">
<summary>
Send and receive raw IP packets on all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_bind_all_nodes" lineno="1283">
<summary>
Bind DCCP sockets to all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_all_nodes" lineno="1301">
<summary>
Bind TCP sockets to all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_bind_all_nodes" lineno="1319">
<summary>
Bind UDP sockets to all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_bind_all_nodes" lineno="1338">
<summary>
Bind raw sockets to all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_sendrecv_generic_port" lineno="1356">
<summary>
Send and receive DCCP network traffic on generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_generic_port" lineno="1374">
<summary>
Send and receive TCP network traffic on generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_dccp_sendrecv_generic_port" lineno="1394">
<summary>
Do not audit attempts to send and
receive DCCP network traffic on
generic ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_sctp_bind_all_nodes" lineno="1412">
<summary>
Bind SCTP sockets to all nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_sendrecv_generic_port" lineno="1431">
<summary>
Do not audit send and receive TCP network traffic on generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_send_generic_port" lineno="1449">
<summary>
Send UDP network traffic on generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_receive_generic_port" lineno="1467">
<summary>
Receive UDP network traffic on generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_sendrecv_generic_port" lineno="1485">
<summary>
Send and receive UDP network traffic on generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_bind_generic_port" lineno="1500">
<summary>
Bind DCCP sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_generic_port" lineno="1520">
<summary>
Bind TCP sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_dccp_bind_generic_port" lineno="1541">
<summary>
Do not audit attempts to bind DCCP
sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_bind_generic_port" lineno="1559">
<summary>
Do not audit bind TCP sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_udp_bind_generic_port" lineno="1577">
<summary>
Bind UDP sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_connect_generic_port" lineno="1597">
<summary>
Connect DCCP sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_connect_generic_port" lineno="1615">
<summary>
Connect TCP sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_sendrecv_all_ports" lineno="1633">
<summary>
Send and receive DCCP network traffic on all ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_all_ports" lineno="1677">
<summary>
Send and receive TCP network traffic on all ports.
</summary>
<desc>
<p>
Send and receive TCP network traffic on all ports.
Related interfaces:
</p>
<ul>
<li>corenet_all_recvfrom_unlabeled()</li>
<li>corenet_tcp_sendrecv_generic_if()</li>
<li>corenet_tcp_sendrecv_generic_node()</li>
<li>corenet_tcp_connect_all_ports()</li>
<li>corenet_tcp_bind_all_ports()</li>
</ul>
<p>
Example client being able to connect to all ports over
generic nodes, without labeled networking:
</p>
<p>
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_all_ports" lineno="1695">
<summary>
Send UDP network traffic on all ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_rawip_bind_unreserved_port" lineno="1713">
<summary>
Bind rawip sockets to unreserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_bind_generic_port" lineno="1731">
<summary>
Bind SCTP sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_sctp_bind_generic_port" lineno="1752">
<summary>
Do not audit attempts to bind SCTP
sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_sctp_bind_all_ports" lineno="1770">
<summary>
Do not audit attepts to bind SCTP sockets to any ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_sctp_connect_all_ports" lineno="1789">
<summary>
Do not audit attempts to connect SCTP sockets
to all ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_sctp_connect_all_unreserved_ports" lineno="1807">
<summary>
Connect SCTP sockets to all ports > 1024.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_connect_all_ports" lineno="1825">
<summary>
Connect SCTP sockets to all ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_bind_all_reserved_ports" lineno="1843">
<summary>
Bind SCTP sockets to all reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_receive_all_ports" lineno="1862">
<summary>
Receive UDP network traffic on all ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_sendrecv_all_ports" lineno="1904">
<summary>
Send and receive UDP network traffic on all ports.
</summary>
<desc>
<p>
Send and receive UDP network traffic on all ports.
Related interfaces:
</p>
<ul>
<li>corenet_all_recvfrom_unlabeled()</li>
<li>corenet_udp_sendrecv_generic_if()</li>
<li>corenet_udp_sendrecv_generic_node()</li>
<li>corenet_udp_bind_all_ports()</li>
</ul>
<p>
Example client being able to send to all ports over
generic nodes, without labeled networking:
</p>
<p>
allow myclient_t self:udp_socket create_socket_perms;
corenet_udp_sendrecv_generic_if(myclient_t)
corenet_udp_sendrecv_generic_node(myclient_t)
corenet_udp_sendrecv_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dccp_bind_all_ports" lineno="1919">
<summary>
Bind DCCP sockets to all ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_all_ports" lineno="1938">
<summary>
Bind TCP sockets to all ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_dccp_bind_all_ports" lineno="1957">
<summary>
Do not audit attepts to bind DCCP sockets to any ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_bind_all_ports" lineno="1975">
<summary>
Do not audit attepts to bind TCP sockets to any ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_udp_bind_all_ports" lineno="1993">
<summary>
Bind UDP sockets to all ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_connect_generic_port" lineno="2012">
<summary>
Connect SCTP sockets to generic ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_bind_all_ports" lineno="2030">
<summary>
Do not audit attepts to bind UDP sockets to any ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dccp_connect_all_ports" lineno="2048">
<summary>
Connect DCCP sockets to all ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_connect_all_ports" lineno="2094">
<summary>
Connect TCP sockets to all ports.
</summary>
<desc>
<p>
Connect TCP sockets to all ports
</p>
<p>
Related interfaces:
</p>
<ul>
<li>corenet_all_recvfrom_unlabeled()</li>
<li>corenet_tcp_sendrecv_generic_if()</li>
<li>corenet_tcp_sendrecv_generic_node()</li>
<li>corenet_tcp_sendrecv_all_ports()</li>
<li>corenet_tcp_bind_all_ports()</li>
</ul>
<p>
Example client being able to connect to all ports over
generic nodes, without labeled networking:
</p>
<p>
allow myclient_t self:tcp_socket create_stream_socket_perms;
corenet_tcp_sendrecv_generic_if(myclient_t)
corenet_tcp_sendrecv_generic_node(myclient_t)
corenet_tcp_sendrecv_all_ports(myclient_t)
corenet_tcp_connect_all_ports(myclient_t)
corenet_all_recvfrom_unlabeled(myclient_t)
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="1"/>
</interface>
<interface name="corenet_dontaudit_dccp_connect_all_ports" lineno="2113">
<summary>
Do not audit attempts to connect DCCP sockets
to all ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_all_ports" lineno="2132">
<summary>
Do not audit attempts to connect TCP sockets
to all ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dccp_sendrecv_reserved_port" lineno="2150">
<summary>
Send and receive DCCP network traffic on generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_reserved_port" lineno="2168">
<summary>
Send and receive TCP network traffic on generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_send_reserved_port" lineno="2186">
<summary>
Send UDP network traffic on generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_receive_reserved_port" lineno="2204">
<summary>
Receive UDP network traffic on generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_sendrecv_reserved_port" lineno="2222">
<summary>
Send and receive UDP network traffic on generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_bind_reserved_port" lineno="2237">
<summary>
Bind DCCP sockets to generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_reserved_port" lineno="2256">
<summary>
Bind TCP sockets to generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_bind_all_ports" lineno="2275">
<summary>
Bind SCTP sockets to all ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_bind_reserved_port" lineno="2294">
<summary>
Bind UDP sockets to generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_connect_reserved_port" lineno="2313">
<summary>
Connect DCCP sockets to generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_connect_reserved_port" lineno="2331">
<summary>
Connect TCP sockets to generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_sendrecv_all_reserved_ports" lineno="2349">
<summary>
Send and receive DCCP network traffic on all reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_all_reserved_ports" lineno="2367">
<summary>
Send and receive TCP network traffic on all reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_send_all_reserved_ports" lineno="2385">
<summary>
Send UDP network traffic on all reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_receive_all_reserved_ports" lineno="2403">
<summary>
Receive UDP network traffic on all reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_sendrecv_all_reserved_ports" lineno="2421">
<summary>
Send and receive UDP network traffic on all reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_bind_all_reserved_ports" lineno="2436">
<summary>
Bind DCCP sockets to all reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_all_reserved_ports" lineno="2455">
<summary>
Bind TCP sockets to all reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_dccp_bind_all_reserved_ports" lineno="2474">
<summary>
Do not audit attempts to bind DCCP sockets to all reserved ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_bind_all_reserved_ports" lineno="2492">
<summary>
Do not audit attempts to bind TCP sockets to all reserved ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_udp_bind_all_reserved_ports" lineno="2510">
<summary>
Bind UDP sockets to all reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_bind_all_reserved_ports" lineno="2529">
<summary>
Do not audit attempts to bind UDP sockets to all reserved ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dccp_bind_all_unreserved_ports" lineno="2547">
<summary>
Bind DCCP sockets to all ports > 1024.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_all_unreserved_ports" lineno="2565">
<summary>
Bind TCP sockets to all ports > 1024.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_unreserved_ports" lineno="2583">
<summary>
Bind TCP sockets to all ports > 1024.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_bind_all_unreserved_ports" lineno="2601">
<summary>
Bind UDP sockets to all ports > 1024.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_all_ephemeral_ports" lineno="2619">
<summary>
Bind TCP sockets to all ports > 32768.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_bind_all_ephemeral_ports" lineno="2637">
<summary>
Bind UDP sockets to all ports > 32768.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_connect_all_reserved_ports" lineno="2655">
<summary>
Connect DCCP sockets to reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_connect_all_reserved_ports" lineno="2673">
<summary>
Connect TCP sockets to reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_connect_all_unreserved_ports" lineno="2691">
<summary>
Connect DCCP sockets to all ports > 1024.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_connect_unreserved_ports" lineno="2709">
<summary>
Connect TCP sockets to ports > 1024.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_connect_all_unreserved_ports" lineno="2727">
<summary>
Connect TCP sockets to all ports > 1024.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_connect_all_ephemeral_ports" lineno="2745">
<summary>
Connect TCP sockets to all ports > 32768.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_dccp_connect_all_reserved_ports" lineno="2764">
<summary>
Do not audit attempts to connect DCCP sockets
all reserved ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_all_reserved_ports" lineno="2783">
<summary>
Do not audit attempts to connect TCP sockets
all reserved ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dccp_connect_all_rpc_ports" lineno="2801">
<summary>
Connect DCCP sockets to rpc ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_connect_all_rpc_ports" lineno="2819">
<summary>
Connect TCP sockets to rpc ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_dccp_connect_all_rpc_ports" lineno="2838">
<summary>
Do not audit attempts to connect DCCP sockets
all rpc ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_all_rpc_ports" lineno="2857">
<summary>
Do not audit attempts to connect TCP sockets
all rpc ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_sctp_bind_reserved_port" lineno="2875">
<summary>
Read and write the TUN/TAP virtual network device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_rw_tun_tap_dev" lineno="2893">
<summary>
</summary>
<param name="domain">
<summary>
The domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_relabel_tun_tap_dev" lineno="2912">
<summary>
Relabel to and from the TUN/TAP virtual network device.
</summary>
<param name="domain">
<summary>
The domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_rw_inherited_tun_tap_dev" lineno="2930">
<summary>
Read and write inherited TUN/TAP virtual network device.
</summary>
<param name="domain">
<summary>
The domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_connect_reserved_port" lineno="2948">
<summary>
Connect SCTP sockets to generic reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_rw_tun_tap_dev" lineno="2967">
<summary>
Do not audit attempts to read or write the TUN/TAP
virtual network device.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_getattr_ppp_dev" lineno="2985">
<summary>
Getattr the point-to-point device.
</summary>
<param name="domain">
<summary>
The domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_rw_ppp_dev" lineno="3003">
<summary>
Read and write the point-to-point device.
</summary>
<param name="domain">
<summary>
The domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_bind_all_rpc_ports" lineno="3022">
<summary>
Bind DCCP sockets to all RPC ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_bind_all_rpc_ports" lineno="3041">
<summary>
Bind TCP sockets to all RPC ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_dccp_bind_all_rpc_ports" lineno="3060">
<summary>
Do not audit attempts to bind DCCP sockets to all RPC ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_bind_all_rpc_ports" lineno="3078">
<summary>
Do not audit attempts to bind TCP sockets to all RPC ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_udp_bind_all_rpc_ports" lineno="3096">
<summary>
Bind UDP sockets to all RPC ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_bind_all_rpc_ports" lineno="3115">
<summary>
Do not audit attempts to bind UDP sockets to all RPC ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_non_ipsec_sendrecv" lineno="3146">
<summary>
Send and receive messages on a
non-encrypted (no IPSEC) network
session.
</summary>
<desc>
<p>
Send and receive messages on a
non-encrypted (no IPSEC) network
session. (Deprecated)
</p>
<p>
The corenet_all_recvfrom_unlabeled() interface should be used instead
of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_non_ipsec_sendrecv" lineno="3174">
<summary>
Do not audit attempts to send and receive
messages on a non-encrypted (no IPSEC) network
session.
</summary>
<desc>
<p>
Do not audit attempts to send and receive
messages on a non-encrypted (no IPSEC) network
session.
</p>
<p>
The corenet_dontaudit_all_recvfrom_unlabeled() interface should be
used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_tcp_recv_netlabel" lineno="3189">
<summary>
Receive TCP packets from a NetLabel connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_recvfrom_netlabel" lineno="3204">
<summary>
Receive DCCP packets from a NetLabel connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_recvfrom_netlabel" lineno="3223">
<summary>
Receive TCP packets from a NetLabel connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dccp_recvfrom_unlabeled" lineno="3242">
<summary>
Receive DCCP packets from an unlabled connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_sctp_bind_all_reserved_ports" lineno="3267">
<summary>
Do not audit attempts to bind SCTP sockets to all reserved ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_recv_netlabel" lineno="3286">
<summary>
Do not audit attempts to receive TCP packets from a NetLabel
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_dccp_recvfrom_netlabel" lineno="3302">
<summary>
Do not audit attempts to receive DCCP packets from a NetLabel
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_recvfrom_netlabel" lineno="3322">
<summary>
Do not audit attempts to receive TCP packets from a NetLabel
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_dccp_recvfrom_unlabeled" lineno="3342">
<summary>
Do not audit attempts to receive DCCP packets from an unlabeled
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_recvfrom_unlabeled" lineno="3363">
<summary>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_udp_recv_netlabel" lineno="3383">
<summary>
Receive UDP packets from a NetLabel connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_recvfrom_netlabel" lineno="3398">
<summary>
Receive UDP packets from a NetLabel connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_udp_recvfrom_unlabeled" lineno="3417">
<summary>
Receive UDP packets from an unlabeled connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_bind_all_unreserved_ports" lineno="3437">
<summary>
Bind SCTP sockets to all ports > 1024.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_recv_netlabel" lineno="3456">
<summary>
Do not audit attempts to receive UDP packets from a NetLabel
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_recvfrom_netlabel" lineno="3472">
<summary>
Do not audit attempts to receive UDP packets from a NetLabel
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_udp_recvfrom_unlabeled" lineno="3492">
<summary>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_raw_recv_netlabel" lineno="3512">
<summary>
Receive Raw IP packets from a NetLabel connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_recvfrom_netlabel" lineno="3527">
<summary>
Receive Raw IP packets from a NetLabel connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_raw_recvfrom_unlabeled" lineno="3546">
<summary>
Receive Raw IP packets from an unlabeled connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_raw_recv_netlabel" lineno="3567">
<summary>
Do not audit attempts to receive Raw IP packets from a NetLabel
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_raw_recvfrom_netlabel" lineno="3583">
<summary>
Do not audit attempts to receive Raw IP packets from a NetLabel
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_sctp_connect_all_reserved_ports" lineno="3602">
<summary>
Connect SCTP sockets to reserved ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_raw_recvfrom_unlabeled" lineno="3621">
<summary>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_all_recvfrom_unlabeled" lineno="3653">
<summary>
Receive packets from an unlabeled connection.
</summary>
<desc>
<p>
Allow the specified domain to receive packets from an
unlabeled connection. On machines that do not utilize
labeled networking, this will be required on all
networking domains. On machines tha do utilize
labeled networking, this will be required for any
networking domain that is allowed to receive
network traffic that does not have a label.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_all_recvfrom_netlabel" lineno="3681">
<summary>
Receive packets from a NetLabel connection.
</summary>
<desc>
<p>
Allow the specified domain to receive NetLabel
network traffic, which utilizes the Commercial IP
Security Option (CIPSO) to set the MLS level
of the network packets. This is required for
all networking domains that receive NetLabel
network traffic.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_enable_unlabeled_packets" lineno="3705">
<summary>
Enable unlabeled net packets
</summary>
<desc>
<p>
Allow unlabeled_packet_t to be used by all domains that use the network
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_all_recvfrom_unlabeled" lineno="3723">
<summary>
Do not audit attempts to receive packets from an unlabeled connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_sctp_connect_all_reserved_ports" lineno="3747">
<summary>
Do not audit attempts to connect SCTP sockets
all reserved ports.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_all_recvfrom_netlabel" lineno="3766">
<summary>
Do not audit attempts to receive packets from a NetLabel
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="corenet_dccp_recvfrom_labeled" lineno="3790">
<summary>
Rules for receiving labeled DCCP packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="peer_domain">
<summary>
Peer domain.
</summary>
</param>
</interface>
<interface name="corenet_tcp_recvfrom_labeled" lineno="3826">
<summary>
Rules for receiving labeled TCP packets.
</summary>
<desc>
<p>
Rules for receiving labeled TCP packets.
</p>
<p>
Due to the nature of TCP, this is bidirectional.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="peer_domain">
<summary>
Peer domain.
</summary>
</param>
</interface>
<interface name="corenet_udp_recvfrom_labeled" lineno="3854">
<summary>
Rules for receiving labeled UDP packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="peer_domain">
<summary>
Peer domain.
</summary>
</param>
</interface>
<interface name="corenet_raw_recvfrom_labeled" lineno="3879">
<summary>
Rules for receiving labeled raw IP packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="peer_domain">
<summary>
Peer domain.
</summary>
</param>
</interface>
<interface name="corenet_all_recvfrom_labeled" lineno="3913">
<summary>
Rules for receiving labeled packets via TCP, UDP and raw IP.
</summary>
<desc>
<p>
Rules for receiving labeled packets via TCP, UDP and raw IP.
</p>
<p>
Due to the nature of TCP, the rules (for TCP
networking only) are bidirectional.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="peer_domain">
<summary>
Peer domain.
</summary>
</param>
</interface>
<interface name="corenet_setcontext_all_spds" lineno="3931">
<summary>
Make the specified type usable
for labeled ipsec.
</summary>
<param name="domain">
<summary>
Type to be used for labeled ipsec.
</summary>
</param>
</interface>
<interface name="corenet_send_generic_client_packets" lineno="3949">
<summary>
Send generic client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_receive_generic_client_packets" lineno="3967">
<summary>
Receive generic client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sendrecv_generic_client_packets" lineno="3985">
<summary>
Send and receive generic client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_relabelto_generic_client_packets" lineno="4000">
<summary>
Relabel packets to the generic client packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_generic_server_packets" lineno="4018">
<summary>
Send generic server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_receive_generic_server_packets" lineno="4036">
<summary>
Receive generic server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sendrecv_generic_server_packets" lineno="4054">
<summary>
Send and receive generic server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_relabelto_generic_server_packets" lineno="4069">
<summary>
Relabel packets to the generic server packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sendrecv_unlabeled_packets" lineno="4094">
<summary>
Send and receive unlabeled packets.
</summary>
<desc>
<p>
Send and receive unlabeled packets.
These packets do not match any netfilter
SECMARK rules.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_all_client_packets" lineno="4108">
<summary>
Send all client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_receive_all_client_packets" lineno="4126">
<summary>
Receive all client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sendrecv_all_client_packets" lineno="4144">
<summary>
Send and receive all client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_relabelto_all_client_packets" lineno="4159">
<summary>
Relabel packets to any client packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_all_server_packets" lineno="4177">
<summary>
Send all server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_recvfrom_netlabel" lineno="4195">
<summary>
Receive SCTP packets from a NetLabel connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_receive_all_server_packets" lineno="4213">
<summary>
Receive all server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sendrecv_all_server_packets" lineno="4231">
<summary>
Send and receive all server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_relabelto_all_server_packets" lineno="4246">
<summary>
Relabel packets to any server packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_recvfrom_unlabeled" lineno="4264">
<summary>
Receive SCTP packets from an unlabled connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_all_packets" lineno="4285">
<summary>
Send all packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_receive_all_packets" lineno="4303">
<summary>
Receive all packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sendrecv_all_packets" lineno="4321">
<summary>
Send and receive all packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_relabelto_all_packets" lineno="4336">
<summary>
Relabel packets to any packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_unconfined" lineno="4354">
<summary>
Unconfined access to network objects.
</summary>
<param name="domain">
<summary>
The domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_bind_all_defined_ports" lineno="4372">
<summary>
Dontaudit bind tcp sockets to defined ports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_filetrans_all_named_dev" lineno="4389">
<summary>
Create all network named devices with the correct label
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_ib_pkey" lineno="4448">
<summary>
Define type to be an infiniband pkey type
</summary>
<desc>
<p>
Define type to be an infiniband pkey type
</p>
<p>
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
</p>
</desc>
<param name="domain">
<summary>
Type to be used for infiniband pkeys.
</summary>
</param>
</interface>
<interface name="corenet_ib_access_unlabeled_pkeys" lineno="4466">
<summary>
Access unlabeled infiniband pkeys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_ib_access_all_pkeys" lineno="4480">
<summary>
Access all labeled infiniband pkeys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_ib_endport" lineno="4507">
<summary>
Define type to be an infiniband endport
</summary>
<desc>
<p>
Define type to be an infiniband endport
</p>
<p>
This is for supporting third party modules and its
use is not allowed in upstream reference policy.
</p>
</desc>
<param name="domain">
<summary>
Type to be used for infiniband endports.
</summary>
</param>
</interface>
<interface name="corenet_ib_manage_subnet_all_endports" lineno="4525">
<summary>
Manage subnets on all labeled Infiniband endports
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_sctp_recvfrom_labeled" lineno="4548">
<summary>
Rules for receiving labeled SCTP packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="peer_domain">
<summary>
Peer domain.
</summary>
</param>
</interface>
<interface name="corenet_ib_manage_subnet_unlabeled_endports" lineno="4571">
<summary>
Manage subnet on all unlabeled Infiniband endports
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_afs_bos_port" lineno="4587">
<summary>
Send and receive TCP traffic on the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_afs_bos_port" lineno="4606">
<summary>
Send UDP traffic on the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_afs_bos_port" lineno="4625">
<summary>
Do not audit attempts to send UDP traffic on the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_afs_bos_port" lineno="4644">
<summary>
Receive UDP traffic on the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_afs_bos_port" lineno="4663">
<summary>
Do not audit attempts to receive UDP traffic on the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_afs_bos_port" lineno="4682">
<summary>
Send and receive UDP traffic on the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_afs_bos_port" lineno="4699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_afs_bos_port" lineno="4715">
<summary>
Bind TCP sockets to the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_afs_bos_port" lineno="4735">
<summary>
Bind UDP sockets to the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_afs_bos_port" lineno="4755">
<summary>
Do not audit attempts to sbind to afs_bos port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_afs_bos_port" lineno="4774">
<summary>
Make a TCP connection to the afs_bos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_afs_bos_port" lineno="4791">
<summary>
Do not audit attempts to make a TCP connection to afs_bos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_bos_client_packets" lineno="4811">
<summary>
Send afs_bos_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_bos_client_packets" lineno="4830">
<summary>
Do not audit attempts to send afs_bos_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_bos_client_packets" lineno="4849">
<summary>
Receive afs_bos_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_bos_client_packets" lineno="4868">
<summary>
Do not audit attempts to receive afs_bos_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_bos_client_packets" lineno="4887">
<summary>
Send and receive afs_bos_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_bos_client_packets" lineno="4903">
<summary>
Do not audit attempts to send and receive afs_bos_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_bos_client_packets" lineno="4918">
<summary>
Relabel packets to afs_bos_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_bos_server_packets" lineno="4938">
<summary>
Send afs_bos_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_bos_server_packets" lineno="4957">
<summary>
Do not audit attempts to send afs_bos_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_bos_server_packets" lineno="4976">
<summary>
Receive afs_bos_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_bos_server_packets" lineno="4995">
<summary>
Do not audit attempts to receive afs_bos_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_bos_server_packets" lineno="5014">
<summary>
Send and receive afs_bos_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_bos_server_packets" lineno="5030">
<summary>
Do not audit attempts to send and receive afs_bos_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_bos_server_packets" lineno="5045">
<summary>
Relabel packets to afs_bos_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_afs_fs_port" lineno="5067">
<summary>
Send and receive TCP traffic on the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_afs_fs_port" lineno="5086">
<summary>
Send UDP traffic on the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_afs_fs_port" lineno="5105">
<summary>
Do not audit attempts to send UDP traffic on the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_afs_fs_port" lineno="5124">
<summary>
Receive UDP traffic on the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_afs_fs_port" lineno="5143">
<summary>
Do not audit attempts to receive UDP traffic on the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_afs_fs_port" lineno="5162">
<summary>
Send and receive UDP traffic on the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_afs_fs_port" lineno="5179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_afs_fs_port" lineno="5195">
<summary>
Bind TCP sockets to the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_afs_fs_port" lineno="5215">
<summary>
Bind UDP sockets to the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_afs_fs_port" lineno="5235">
<summary>
Do not audit attempts to sbind to afs_fs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_afs_fs_port" lineno="5254">
<summary>
Make a TCP connection to the afs_fs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_afs_fs_port" lineno="5271">
<summary>
Do not audit attempts to make a TCP connection to afs_fs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_fs_client_packets" lineno="5291">
<summary>
Send afs_fs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_fs_client_packets" lineno="5310">
<summary>
Do not audit attempts to send afs_fs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_fs_client_packets" lineno="5329">
<summary>
Receive afs_fs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_fs_client_packets" lineno="5348">
<summary>
Do not audit attempts to receive afs_fs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_fs_client_packets" lineno="5367">
<summary>
Send and receive afs_fs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_fs_client_packets" lineno="5383">
<summary>
Do not audit attempts to send and receive afs_fs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_fs_client_packets" lineno="5398">
<summary>
Relabel packets to afs_fs_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_fs_server_packets" lineno="5418">
<summary>
Send afs_fs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_fs_server_packets" lineno="5437">
<summary>
Do not audit attempts to send afs_fs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_fs_server_packets" lineno="5456">
<summary>
Receive afs_fs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_fs_server_packets" lineno="5475">
<summary>
Do not audit attempts to receive afs_fs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_fs_server_packets" lineno="5494">
<summary>
Send and receive afs_fs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_fs_server_packets" lineno="5510">
<summary>
Do not audit attempts to send and receive afs_fs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_fs_server_packets" lineno="5525">
<summary>
Relabel packets to afs_fs_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_afs_ka_port" lineno="5547">
<summary>
Send and receive TCP traffic on the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_afs_ka_port" lineno="5566">
<summary>
Send UDP traffic on the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_afs_ka_port" lineno="5585">
<summary>
Do not audit attempts to send UDP traffic on the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_afs_ka_port" lineno="5604">
<summary>
Receive UDP traffic on the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_afs_ka_port" lineno="5623">
<summary>
Do not audit attempts to receive UDP traffic on the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_afs_ka_port" lineno="5642">
<summary>
Send and receive UDP traffic on the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_afs_ka_port" lineno="5659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_afs_ka_port" lineno="5675">
<summary>
Bind TCP sockets to the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_afs_ka_port" lineno="5695">
<summary>
Bind UDP sockets to the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_afs_ka_port" lineno="5715">
<summary>
Do not audit attempts to sbind to afs_ka port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_afs_ka_port" lineno="5734">
<summary>
Make a TCP connection to the afs_ka port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_afs_ka_port" lineno="5751">
<summary>
Do not audit attempts to make a TCP connection to afs_ka port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_ka_client_packets" lineno="5771">
<summary>
Send afs_ka_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_ka_client_packets" lineno="5790">
<summary>
Do not audit attempts to send afs_ka_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_ka_client_packets" lineno="5809">
<summary>
Receive afs_ka_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_ka_client_packets" lineno="5828">
<summary>
Do not audit attempts to receive afs_ka_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_ka_client_packets" lineno="5847">
<summary>
Send and receive afs_ka_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_ka_client_packets" lineno="5863">
<summary>
Do not audit attempts to send and receive afs_ka_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_ka_client_packets" lineno="5878">
<summary>
Relabel packets to afs_ka_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_ka_server_packets" lineno="5898">
<summary>
Send afs_ka_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_ka_server_packets" lineno="5917">
<summary>
Do not audit attempts to send afs_ka_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_ka_server_packets" lineno="5936">
<summary>
Receive afs_ka_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_ka_server_packets" lineno="5955">
<summary>
Do not audit attempts to receive afs_ka_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_ka_server_packets" lineno="5974">
<summary>
Send and receive afs_ka_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_ka_server_packets" lineno="5990">
<summary>
Do not audit attempts to send and receive afs_ka_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_ka_server_packets" lineno="6005">
<summary>
Relabel packets to afs_ka_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_afs_pt_port" lineno="6027">
<summary>
Send and receive TCP traffic on the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_afs_pt_port" lineno="6046">
<summary>
Send UDP traffic on the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_afs_pt_port" lineno="6065">
<summary>
Do not audit attempts to send UDP traffic on the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_afs_pt_port" lineno="6084">
<summary>
Receive UDP traffic on the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_afs_pt_port" lineno="6103">
<summary>
Do not audit attempts to receive UDP traffic on the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_afs_pt_port" lineno="6122">
<summary>
Send and receive UDP traffic on the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_afs_pt_port" lineno="6139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_afs_pt_port" lineno="6155">
<summary>
Bind TCP sockets to the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_afs_pt_port" lineno="6175">
<summary>
Bind UDP sockets to the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_afs_pt_port" lineno="6195">
<summary>
Do not audit attempts to sbind to afs_pt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_afs_pt_port" lineno="6214">
<summary>
Make a TCP connection to the afs_pt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_afs_pt_port" lineno="6231">
<summary>
Do not audit attempts to make a TCP connection to afs_pt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_pt_client_packets" lineno="6251">
<summary>
Send afs_pt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_pt_client_packets" lineno="6270">
<summary>
Do not audit attempts to send afs_pt_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_pt_client_packets" lineno="6289">
<summary>
Receive afs_pt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_pt_client_packets" lineno="6308">
<summary>
Do not audit attempts to receive afs_pt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_pt_client_packets" lineno="6327">
<summary>
Send and receive afs_pt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_pt_client_packets" lineno="6343">
<summary>
Do not audit attempts to send and receive afs_pt_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_pt_client_packets" lineno="6358">
<summary>
Relabel packets to afs_pt_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_pt_server_packets" lineno="6378">
<summary>
Send afs_pt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_pt_server_packets" lineno="6397">
<summary>
Do not audit attempts to send afs_pt_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_pt_server_packets" lineno="6416">
<summary>
Receive afs_pt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_pt_server_packets" lineno="6435">
<summary>
Do not audit attempts to receive afs_pt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_pt_server_packets" lineno="6454">
<summary>
Send and receive afs_pt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_pt_server_packets" lineno="6470">
<summary>
Do not audit attempts to send and receive afs_pt_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_pt_server_packets" lineno="6485">
<summary>
Relabel packets to afs_pt_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_afs_vl_port" lineno="6507">
<summary>
Send and receive TCP traffic on the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_afs_vl_port" lineno="6526">
<summary>
Send UDP traffic on the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_afs_vl_port" lineno="6545">
<summary>
Do not audit attempts to send UDP traffic on the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_afs_vl_port" lineno="6564">
<summary>
Receive UDP traffic on the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_afs_vl_port" lineno="6583">
<summary>
Do not audit attempts to receive UDP traffic on the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_afs_vl_port" lineno="6602">
<summary>
Send and receive UDP traffic on the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_afs_vl_port" lineno="6619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_afs_vl_port" lineno="6635">
<summary>
Bind TCP sockets to the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_afs_vl_port" lineno="6655">
<summary>
Bind UDP sockets to the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_afs_vl_port" lineno="6675">
<summary>
Do not audit attempts to sbind to afs_vl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_afs_vl_port" lineno="6694">
<summary>
Make a TCP connection to the afs_vl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_afs_vl_port" lineno="6711">
<summary>
Do not audit attempts to make a TCP connection to afs_vl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_vl_client_packets" lineno="6731">
<summary>
Send afs_vl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_vl_client_packets" lineno="6750">
<summary>
Do not audit attempts to send afs_vl_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_vl_client_packets" lineno="6769">
<summary>
Receive afs_vl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_vl_client_packets" lineno="6788">
<summary>
Do not audit attempts to receive afs_vl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_vl_client_packets" lineno="6807">
<summary>
Send and receive afs_vl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_vl_client_packets" lineno="6823">
<summary>
Do not audit attempts to send and receive afs_vl_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_vl_client_packets" lineno="6838">
<summary>
Relabel packets to afs_vl_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs_vl_server_packets" lineno="6858">
<summary>
Send afs_vl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs_vl_server_packets" lineno="6877">
<summary>
Do not audit attempts to send afs_vl_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs_vl_server_packets" lineno="6896">
<summary>
Receive afs_vl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs_vl_server_packets" lineno="6915">
<summary>
Do not audit attempts to receive afs_vl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs_vl_server_packets" lineno="6934">
<summary>
Send and receive afs_vl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs_vl_server_packets" lineno="6950">
<summary>
Do not audit attempts to send and receive afs_vl_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs_vl_server_packets" lineno="6965">
<summary>
Relabel packets to afs_vl_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_afs3_callback_port" lineno="6987">
<summary>
Send and receive TCP traffic on the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_afs3_callback_port" lineno="7006">
<summary>
Send UDP traffic on the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_afs3_callback_port" lineno="7025">
<summary>
Do not audit attempts to send UDP traffic on the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_afs3_callback_port" lineno="7044">
<summary>
Receive UDP traffic on the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_afs3_callback_port" lineno="7063">
<summary>
Do not audit attempts to receive UDP traffic on the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_afs3_callback_port" lineno="7082">
<summary>
Send and receive UDP traffic on the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_afs3_callback_port" lineno="7099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_afs3_callback_port" lineno="7115">
<summary>
Bind TCP sockets to the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_afs3_callback_port" lineno="7135">
<summary>
Bind UDP sockets to the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_afs3_callback_port" lineno="7155">
<summary>
Do not audit attempts to sbind to afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_afs3_callback_port" lineno="7174">
<summary>
Make a TCP connection to the afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_afs3_callback_port" lineno="7191">
<summary>
Do not audit attempts to make a TCP connection to afs3_callback port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs3_callback_client_packets" lineno="7211">
<summary>
Send afs3_callback_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs3_callback_client_packets" lineno="7230">
<summary>
Do not audit attempts to send afs3_callback_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs3_callback_client_packets" lineno="7249">
<summary>
Receive afs3_callback_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs3_callback_client_packets" lineno="7268">
<summary>
Do not audit attempts to receive afs3_callback_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs3_callback_client_packets" lineno="7287">
<summary>
Send and receive afs3_callback_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs3_callback_client_packets" lineno="7303">
<summary>
Do not audit attempts to send and receive afs3_callback_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs3_callback_client_packets" lineno="7318">
<summary>
Relabel packets to afs3_callback_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_afs3_callback_server_packets" lineno="7338">
<summary>
Send afs3_callback_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_afs3_callback_server_packets" lineno="7357">
<summary>
Do not audit attempts to send afs3_callback_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_afs3_callback_server_packets" lineno="7376">
<summary>
Receive afs3_callback_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_afs3_callback_server_packets" lineno="7395">
<summary>
Do not audit attempts to receive afs3_callback_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_afs3_callback_server_packets" lineno="7414">
<summary>
Send and receive afs3_callback_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_afs3_callback_server_packets" lineno="7430">
<summary>
Do not audit attempts to send and receive afs3_callback_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_afs3_callback_server_packets" lineno="7445">
<summary>
Relabel packets to afs3_callback_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_agentx_port" lineno="7467">
<summary>
Send and receive TCP traffic on the agentx port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_agentx_port" lineno="7486">
<summary>
Send UDP traffic on the agentx port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_agentx_port" lineno="7505">
<summary>
Do not audit attempts to send UDP traffic on the agentx port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_agentx_port" lineno="7524">
<summary>
Receive UDP traffic on the agentx port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_agentx_port" lineno="7543">
<summary>
Do not audit attempts to receive UDP traffic on the agentx port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_agentx_port" lineno="7562">
<summary>
Send and receive UDP traffic on the agentx port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_agentx_port" lineno="7579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the agentx port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_agentx_port" lineno="7595">
<summary>
Bind TCP sockets to the agentx port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_agentx_port" lineno="7615">
<summary>
Bind UDP sockets to the agentx port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_agentx_port" lineno="7635">
<summary>
Do not audit attempts to sbind to agentx port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_agentx_port" lineno="7654">
<summary>
Make a TCP connection to the agentx port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_agentx_port" lineno="7671">
<summary>
Do not audit attempts to make a TCP connection to agentx port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_agentx_client_packets" lineno="7691">
<summary>
Send agentx_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_agentx_client_packets" lineno="7710">
<summary>
Do not audit attempts to send agentx_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_agentx_client_packets" lineno="7729">
<summary>
Receive agentx_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_agentx_client_packets" lineno="7748">
<summary>
Do not audit attempts to receive agentx_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_agentx_client_packets" lineno="7767">
<summary>
Send and receive agentx_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_agentx_client_packets" lineno="7783">
<summary>
Do not audit attempts to send and receive agentx_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_agentx_client_packets" lineno="7798">
<summary>
Relabel packets to agentx_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_agentx_server_packets" lineno="7818">
<summary>
Send agentx_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_agentx_server_packets" lineno="7837">
<summary>
Do not audit attempts to send agentx_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_agentx_server_packets" lineno="7856">
<summary>
Receive agentx_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_agentx_server_packets" lineno="7875">
<summary>
Do not audit attempts to receive agentx_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_agentx_server_packets" lineno="7894">
<summary>
Send and receive agentx_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_agentx_server_packets" lineno="7910">
<summary>
Do not audit attempts to send and receive agentx_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_agentx_server_packets" lineno="7925">
<summary>
Relabel packets to agentx_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_amanda_port" lineno="7947">
<summary>
Send and receive TCP traffic on the amanda port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_amanda_port" lineno="7966">
<summary>
Send UDP traffic on the amanda port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_amanda_port" lineno="7985">
<summary>
Do not audit attempts to send UDP traffic on the amanda port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_amanda_port" lineno="8004">
<summary>
Receive UDP traffic on the amanda port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_amanda_port" lineno="8023">
<summary>
Do not audit attempts to receive UDP traffic on the amanda port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_amanda_port" lineno="8042">
<summary>
Send and receive UDP traffic on the amanda port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_amanda_port" lineno="8059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amanda port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_amanda_port" lineno="8075">
<summary>
Bind TCP sockets to the amanda port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_amanda_port" lineno="8095">
<summary>
Bind UDP sockets to the amanda port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_amanda_port" lineno="8115">
<summary>
Do not audit attempts to sbind to amanda port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_amanda_port" lineno="8134">
<summary>
Make a TCP connection to the amanda port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_amanda_port" lineno="8151">
<summary>
Do not audit attempts to make a TCP connection to amanda port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_amanda_client_packets" lineno="8171">
<summary>
Send amanda_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_amanda_client_packets" lineno="8190">
<summary>
Do not audit attempts to send amanda_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_amanda_client_packets" lineno="8209">
<summary>
Receive amanda_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_amanda_client_packets" lineno="8228">
<summary>
Do not audit attempts to receive amanda_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_amanda_client_packets" lineno="8247">
<summary>
Send and receive amanda_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_amanda_client_packets" lineno="8263">
<summary>
Do not audit attempts to send and receive amanda_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_amanda_client_packets" lineno="8278">
<summary>
Relabel packets to amanda_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_amanda_server_packets" lineno="8298">
<summary>
Send amanda_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_amanda_server_packets" lineno="8317">
<summary>
Do not audit attempts to send amanda_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_amanda_server_packets" lineno="8336">
<summary>
Receive amanda_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_amanda_server_packets" lineno="8355">
<summary>
Do not audit attempts to receive amanda_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_amanda_server_packets" lineno="8374">
<summary>
Send and receive amanda_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_amanda_server_packets" lineno="8390">
<summary>
Do not audit attempts to send and receive amanda_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_amanda_server_packets" lineno="8405">
<summary>
Relabel packets to amanda_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_amavisd_recv_port" lineno="8427">
<summary>
Send and receive TCP traffic on the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_amavisd_recv_port" lineno="8446">
<summary>
Send UDP traffic on the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_amavisd_recv_port" lineno="8465">
<summary>
Do not audit attempts to send UDP traffic on the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_amavisd_recv_port" lineno="8484">
<summary>
Receive UDP traffic on the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_amavisd_recv_port" lineno="8503">
<summary>
Do not audit attempts to receive UDP traffic on the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_amavisd_recv_port" lineno="8522">
<summary>
Send and receive UDP traffic on the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_amavisd_recv_port" lineno="8539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_amavisd_recv_port" lineno="8555">
<summary>
Bind TCP sockets to the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_amavisd_recv_port" lineno="8575">
<summary>
Bind UDP sockets to the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_amavisd_recv_port" lineno="8595">
<summary>
Do not audit attempts to sbind to amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_amavisd_recv_port" lineno="8614">
<summary>
Make a TCP connection to the amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_amavisd_recv_port" lineno="8631">
<summary>
Do not audit attempts to make a TCP connection to amavisd_recv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_amavisd_recv_client_packets" lineno="8651">
<summary>
Send amavisd_recv_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_amavisd_recv_client_packets" lineno="8670">
<summary>
Do not audit attempts to send amavisd_recv_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_amavisd_recv_client_packets" lineno="8689">
<summary>
Receive amavisd_recv_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_amavisd_recv_client_packets" lineno="8708">
<summary>
Do not audit attempts to receive amavisd_recv_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_amavisd_recv_client_packets" lineno="8727">
<summary>
Send and receive amavisd_recv_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_amavisd_recv_client_packets" lineno="8743">
<summary>
Do not audit attempts to send and receive amavisd_recv_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_amavisd_recv_client_packets" lineno="8758">
<summary>
Relabel packets to amavisd_recv_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_amavisd_recv_server_packets" lineno="8778">
<summary>
Send amavisd_recv_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_amavisd_recv_server_packets" lineno="8797">
<summary>
Do not audit attempts to send amavisd_recv_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_amavisd_recv_server_packets" lineno="8816">
<summary>
Receive amavisd_recv_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_amavisd_recv_server_packets" lineno="8835">
<summary>
Do not audit attempts to receive amavisd_recv_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_amavisd_recv_server_packets" lineno="8854">
<summary>
Send and receive amavisd_recv_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_amavisd_recv_server_packets" lineno="8870">
<summary>
Do not audit attempts to send and receive amavisd_recv_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_amavisd_recv_server_packets" lineno="8885">
<summary>
Relabel packets to amavisd_recv_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_amavisd_send_port" lineno="8907">
<summary>
Send and receive TCP traffic on the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_amavisd_send_port" lineno="8926">
<summary>
Send UDP traffic on the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_amavisd_send_port" lineno="8945">
<summary>
Do not audit attempts to send UDP traffic on the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_amavisd_send_port" lineno="8964">
<summary>
Receive UDP traffic on the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_amavisd_send_port" lineno="8983">
<summary>
Do not audit attempts to receive UDP traffic on the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_amavisd_send_port" lineno="9002">
<summary>
Send and receive UDP traffic on the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_amavisd_send_port" lineno="9019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_amavisd_send_port" lineno="9035">
<summary>
Bind TCP sockets to the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_amavisd_send_port" lineno="9055">
<summary>
Bind UDP sockets to the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_amavisd_send_port" lineno="9075">
<summary>
Do not audit attempts to sbind to amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_amavisd_send_port" lineno="9094">
<summary>
Make a TCP connection to the amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_amavisd_send_port" lineno="9111">
<summary>
Do not audit attempts to make a TCP connection to amavisd_send port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_amavisd_send_client_packets" lineno="9131">
<summary>
Send amavisd_send_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_amavisd_send_client_packets" lineno="9150">
<summary>
Do not audit attempts to send amavisd_send_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_amavisd_send_client_packets" lineno="9169">
<summary>
Receive amavisd_send_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_amavisd_send_client_packets" lineno="9188">
<summary>
Do not audit attempts to receive amavisd_send_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_amavisd_send_client_packets" lineno="9207">
<summary>
Send and receive amavisd_send_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_amavisd_send_client_packets" lineno="9223">
<summary>
Do not audit attempts to send and receive amavisd_send_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_amavisd_send_client_packets" lineno="9238">
<summary>
Relabel packets to amavisd_send_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_amavisd_send_server_packets" lineno="9258">
<summary>
Send amavisd_send_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_amavisd_send_server_packets" lineno="9277">
<summary>
Do not audit attempts to send amavisd_send_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_amavisd_send_server_packets" lineno="9296">
<summary>
Receive amavisd_send_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_amavisd_send_server_packets" lineno="9315">
<summary>
Do not audit attempts to receive amavisd_send_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_amavisd_send_server_packets" lineno="9334">
<summary>
Send and receive amavisd_send_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_amavisd_send_server_packets" lineno="9350">
<summary>
Do not audit attempts to send and receive amavisd_send_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_amavisd_send_server_packets" lineno="9365">
<summary>
Relabel packets to amavisd_send_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_amqp_port" lineno="9387">
<summary>
Send and receive TCP traffic on the amqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_amqp_port" lineno="9406">
<summary>
Send UDP traffic on the amqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_amqp_port" lineno="9425">
<summary>
Do not audit attempts to send UDP traffic on the amqp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_amqp_port" lineno="9444">
<summary>
Receive UDP traffic on the amqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_amqp_port" lineno="9463">
<summary>
Do not audit attempts to receive UDP traffic on the amqp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_amqp_port" lineno="9482">
<summary>
Send and receive UDP traffic on the amqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_amqp_port" lineno="9499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the amqp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_amqp_port" lineno="9515">
<summary>
Bind TCP sockets to the amqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_amqp_port" lineno="9535">
<summary>
Bind UDP sockets to the amqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_amqp_port" lineno="9555">
<summary>
Do not audit attempts to sbind to amqp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_amqp_port" lineno="9574">
<summary>
Make a TCP connection to the amqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_amqp_port" lineno="9591">
<summary>
Do not audit attempts to make a TCP connection to amqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_amqp_client_packets" lineno="9611">
<summary>
Send amqp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_amqp_client_packets" lineno="9630">
<summary>
Do not audit attempts to send amqp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_amqp_client_packets" lineno="9649">
<summary>
Receive amqp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_amqp_client_packets" lineno="9668">
<summary>
Do not audit attempts to receive amqp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_amqp_client_packets" lineno="9687">
<summary>
Send and receive amqp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_amqp_client_packets" lineno="9703">
<summary>
Do not audit attempts to send and receive amqp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_amqp_client_packets" lineno="9718">
<summary>
Relabel packets to amqp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_amqp_server_packets" lineno="9738">
<summary>
Send amqp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_amqp_server_packets" lineno="9757">
<summary>
Do not audit attempts to send amqp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_amqp_server_packets" lineno="9776">
<summary>
Receive amqp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_amqp_server_packets" lineno="9795">
<summary>
Do not audit attempts to receive amqp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_amqp_server_packets" lineno="9814">
<summary>
Send and receive amqp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_amqp_server_packets" lineno="9830">
<summary>
Do not audit attempts to send and receive amqp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_amqp_server_packets" lineno="9845">
<summary>
Relabel packets to amqp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_aol_port" lineno="9867">
<summary>
Send and receive TCP traffic on the aol port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_aol_port" lineno="9886">
<summary>
Send UDP traffic on the aol port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_aol_port" lineno="9905">
<summary>
Do not audit attempts to send UDP traffic on the aol port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_aol_port" lineno="9924">
<summary>
Receive UDP traffic on the aol port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_aol_port" lineno="9943">
<summary>
Do not audit attempts to receive UDP traffic on the aol port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_aol_port" lineno="9962">
<summary>
Send and receive UDP traffic on the aol port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_aol_port" lineno="9979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the aol port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_aol_port" lineno="9995">
<summary>
Bind TCP sockets to the aol port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_aol_port" lineno="10015">
<summary>
Bind UDP sockets to the aol port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_aol_port" lineno="10035">
<summary>
Do not audit attempts to sbind to aol port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_aol_port" lineno="10054">
<summary>
Make a TCP connection to the aol port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_aol_port" lineno="10071">
<summary>
Do not audit attempts to make a TCP connection to aol port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_aol_client_packets" lineno="10091">
<summary>
Send aol_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_aol_client_packets" lineno="10110">
<summary>
Do not audit attempts to send aol_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_aol_client_packets" lineno="10129">
<summary>
Receive aol_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_aol_client_packets" lineno="10148">
<summary>
Do not audit attempts to receive aol_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_aol_client_packets" lineno="10167">
<summary>
Send and receive aol_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_aol_client_packets" lineno="10183">
<summary>
Do not audit attempts to send and receive aol_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_aol_client_packets" lineno="10198">
<summary>
Relabel packets to aol_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_aol_server_packets" lineno="10218">
<summary>
Send aol_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_aol_server_packets" lineno="10237">
<summary>
Do not audit attempts to send aol_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_aol_server_packets" lineno="10256">
<summary>
Receive aol_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_aol_server_packets" lineno="10275">
<summary>
Do not audit attempts to receive aol_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_aol_server_packets" lineno="10294">
<summary>
Send and receive aol_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_aol_server_packets" lineno="10310">
<summary>
Do not audit attempts to send and receive aol_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_aol_server_packets" lineno="10325">
<summary>
Relabel packets to aol_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_apc_port" lineno="10347">
<summary>
Send and receive TCP traffic on the apc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_apc_port" lineno="10366">
<summary>
Send UDP traffic on the apc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_apc_port" lineno="10385">
<summary>
Do not audit attempts to send UDP traffic on the apc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_apc_port" lineno="10404">
<summary>
Receive UDP traffic on the apc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_apc_port" lineno="10423">
<summary>
Do not audit attempts to receive UDP traffic on the apc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_apc_port" lineno="10442">
<summary>
Send and receive UDP traffic on the apc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_apc_port" lineno="10459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the apc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_apc_port" lineno="10475">
<summary>
Bind TCP sockets to the apc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_apc_port" lineno="10495">
<summary>
Bind UDP sockets to the apc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_apc_port" lineno="10515">
<summary>
Do not audit attempts to sbind to apc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_apc_port" lineno="10534">
<summary>
Make a TCP connection to the apc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_apc_port" lineno="10551">
<summary>
Do not audit attempts to make a TCP connection to apc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_apc_client_packets" lineno="10571">
<summary>
Send apc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_apc_client_packets" lineno="10590">
<summary>
Do not audit attempts to send apc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_apc_client_packets" lineno="10609">
<summary>
Receive apc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_apc_client_packets" lineno="10628">
<summary>
Do not audit attempts to receive apc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_apc_client_packets" lineno="10647">
<summary>
Send and receive apc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_apc_client_packets" lineno="10663">
<summary>
Do not audit attempts to send and receive apc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_apc_client_packets" lineno="10678">
<summary>
Relabel packets to apc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_apc_server_packets" lineno="10698">
<summary>
Send apc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_apc_server_packets" lineno="10717">
<summary>
Do not audit attempts to send apc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_apc_server_packets" lineno="10736">
<summary>
Receive apc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_apc_server_packets" lineno="10755">
<summary>
Do not audit attempts to receive apc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_apc_server_packets" lineno="10774">
<summary>
Send and receive apc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_apc_server_packets" lineno="10790">
<summary>
Do not audit attempts to send and receive apc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_apc_server_packets" lineno="10805">
<summary>
Relabel packets to apc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_apcupsd_port" lineno="10827">
<summary>
Send and receive TCP traffic on the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_apcupsd_port" lineno="10846">
<summary>
Send UDP traffic on the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_apcupsd_port" lineno="10865">
<summary>
Do not audit attempts to send UDP traffic on the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_apcupsd_port" lineno="10884">
<summary>
Receive UDP traffic on the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_apcupsd_port" lineno="10903">
<summary>
Do not audit attempts to receive UDP traffic on the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_apcupsd_port" lineno="10922">
<summary>
Send and receive UDP traffic on the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_apcupsd_port" lineno="10939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_apcupsd_port" lineno="10955">
<summary>
Bind TCP sockets to the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_apcupsd_port" lineno="10975">
<summary>
Bind UDP sockets to the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_apcupsd_port" lineno="10995">
<summary>
Do not audit attempts to sbind to apcupsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_apcupsd_port" lineno="11014">
<summary>
Make a TCP connection to the apcupsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_apcupsd_port" lineno="11031">
<summary>
Do not audit attempts to make a TCP connection to apcupsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_apcupsd_client_packets" lineno="11051">
<summary>
Send apcupsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_apcupsd_client_packets" lineno="11070">
<summary>
Do not audit attempts to send apcupsd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_apcupsd_client_packets" lineno="11089">
<summary>
Receive apcupsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_apcupsd_client_packets" lineno="11108">
<summary>
Do not audit attempts to receive apcupsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_apcupsd_client_packets" lineno="11127">
<summary>
Send and receive apcupsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_apcupsd_client_packets" lineno="11143">
<summary>
Do not audit attempts to send and receive apcupsd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_apcupsd_client_packets" lineno="11158">
<summary>
Relabel packets to apcupsd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_apcupsd_server_packets" lineno="11178">
<summary>
Send apcupsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_apcupsd_server_packets" lineno="11197">
<summary>
Do not audit attempts to send apcupsd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_apcupsd_server_packets" lineno="11216">
<summary>
Receive apcupsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_apcupsd_server_packets" lineno="11235">
<summary>
Do not audit attempts to receive apcupsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_apcupsd_server_packets" lineno="11254">
<summary>
Send and receive apcupsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_apcupsd_server_packets" lineno="11270">
<summary>
Do not audit attempts to send and receive apcupsd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_apcupsd_server_packets" lineno="11285">
<summary>
Relabel packets to apcupsd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_apertus_ldp_port" lineno="11307">
<summary>
Send and receive TCP traffic on the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_apertus_ldp_port" lineno="11326">
<summary>
Send UDP traffic on the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_apertus_ldp_port" lineno="11345">
<summary>
Do not audit attempts to send UDP traffic on the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_apertus_ldp_port" lineno="11364">
<summary>
Receive UDP traffic on the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_apertus_ldp_port" lineno="11383">
<summary>
Do not audit attempts to receive UDP traffic on the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_apertus_ldp_port" lineno="11402">
<summary>
Send and receive UDP traffic on the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_apertus_ldp_port" lineno="11419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_apertus_ldp_port" lineno="11435">
<summary>
Bind TCP sockets to the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_apertus_ldp_port" lineno="11455">
<summary>
Bind UDP sockets to the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_apertus_ldp_port" lineno="11475">
<summary>
Do not audit attempts to sbind to apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_apertus_ldp_port" lineno="11494">
<summary>
Make a TCP connection to the apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_apertus_ldp_port" lineno="11511">
<summary>
Do not audit attempts to make a TCP connection to apertus_ldp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_apertus_ldp_client_packets" lineno="11531">
<summary>
Send apertus_ldp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_apertus_ldp_client_packets" lineno="11550">
<summary>
Do not audit attempts to send apertus_ldp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_apertus_ldp_client_packets" lineno="11569">
<summary>
Receive apertus_ldp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_apertus_ldp_client_packets" lineno="11588">
<summary>
Do not audit attempts to receive apertus_ldp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_apertus_ldp_client_packets" lineno="11607">
<summary>
Send and receive apertus_ldp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_apertus_ldp_client_packets" lineno="11623">
<summary>
Do not audit attempts to send and receive apertus_ldp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_apertus_ldp_client_packets" lineno="11638">
<summary>
Relabel packets to apertus_ldp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_apertus_ldp_server_packets" lineno="11658">
<summary>
Send apertus_ldp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_apertus_ldp_server_packets" lineno="11677">
<summary>
Do not audit attempts to send apertus_ldp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_apertus_ldp_server_packets" lineno="11696">
<summary>
Receive apertus_ldp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_apertus_ldp_server_packets" lineno="11715">
<summary>
Do not audit attempts to receive apertus_ldp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_apertus_ldp_server_packets" lineno="11734">
<summary>
Send and receive apertus_ldp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_apertus_ldp_server_packets" lineno="11750">
<summary>
Do not audit attempts to send and receive apertus_ldp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_apertus_ldp_server_packets" lineno="11765">
<summary>
Relabel packets to apertus_ldp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_appswitch_emp_port" lineno="11787">
<summary>
Send and receive TCP traffic on the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_appswitch_emp_port" lineno="11806">
<summary>
Send UDP traffic on the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_appswitch_emp_port" lineno="11825">
<summary>
Do not audit attempts to send UDP traffic on the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_appswitch_emp_port" lineno="11844">
<summary>
Receive UDP traffic on the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_appswitch_emp_port" lineno="11863">
<summary>
Do not audit attempts to receive UDP traffic on the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_appswitch_emp_port" lineno="11882">
<summary>
Send and receive UDP traffic on the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_appswitch_emp_port" lineno="11899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_appswitch_emp_port" lineno="11915">
<summary>
Bind TCP sockets to the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_appswitch_emp_port" lineno="11935">
<summary>
Bind UDP sockets to the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_appswitch_emp_port" lineno="11955">
<summary>
Do not audit attempts to sbind to appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_appswitch_emp_port" lineno="11974">
<summary>
Make a TCP connection to the appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_appswitch_emp_port" lineno="11991">
<summary>
Do not audit attempts to make a TCP connection to appswitch_emp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_appswitch_emp_client_packets" lineno="12011">
<summary>
Send appswitch_emp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_appswitch_emp_client_packets" lineno="12030">
<summary>
Do not audit attempts to send appswitch_emp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_appswitch_emp_client_packets" lineno="12049">
<summary>
Receive appswitch_emp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_appswitch_emp_client_packets" lineno="12068">
<summary>
Do not audit attempts to receive appswitch_emp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_appswitch_emp_client_packets" lineno="12087">
<summary>
Send and receive appswitch_emp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_appswitch_emp_client_packets" lineno="12103">
<summary>
Do not audit attempts to send and receive appswitch_emp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_appswitch_emp_client_packets" lineno="12118">
<summary>
Relabel packets to appswitch_emp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_appswitch_emp_server_packets" lineno="12138">
<summary>
Send appswitch_emp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_appswitch_emp_server_packets" lineno="12157">
<summary>
Do not audit attempts to send appswitch_emp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_appswitch_emp_server_packets" lineno="12176">
<summary>
Receive appswitch_emp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_appswitch_emp_server_packets" lineno="12195">
<summary>
Do not audit attempts to receive appswitch_emp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_appswitch_emp_server_packets" lineno="12214">
<summary>
Send and receive appswitch_emp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_appswitch_emp_server_packets" lineno="12230">
<summary>
Do not audit attempts to send and receive appswitch_emp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_appswitch_emp_server_packets" lineno="12245">
<summary>
Relabel packets to appswitch_emp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_asterisk_port" lineno="12267">
<summary>
Send and receive TCP traffic on the asterisk port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_asterisk_port" lineno="12286">
<summary>
Send UDP traffic on the asterisk port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_asterisk_port" lineno="12305">
<summary>
Do not audit attempts to send UDP traffic on the asterisk port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_asterisk_port" lineno="12324">
<summary>
Receive UDP traffic on the asterisk port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_asterisk_port" lineno="12343">
<summary>
Do not audit attempts to receive UDP traffic on the asterisk port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_asterisk_port" lineno="12362">
<summary>
Send and receive UDP traffic on the asterisk port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_asterisk_port" lineno="12379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the asterisk port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_asterisk_port" lineno="12395">
<summary>
Bind TCP sockets to the asterisk port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_asterisk_port" lineno="12415">
<summary>
Bind UDP sockets to the asterisk port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_asterisk_port" lineno="12435">
<summary>
Do not audit attempts to sbind to asterisk port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_asterisk_port" lineno="12454">
<summary>
Make a TCP connection to the asterisk port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_asterisk_port" lineno="12471">
<summary>
Do not audit attempts to make a TCP connection to asterisk port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_asterisk_client_packets" lineno="12491">
<summary>
Send asterisk_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_asterisk_client_packets" lineno="12510">
<summary>
Do not audit attempts to send asterisk_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_asterisk_client_packets" lineno="12529">
<summary>
Receive asterisk_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_asterisk_client_packets" lineno="12548">
<summary>
Do not audit attempts to receive asterisk_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_asterisk_client_packets" lineno="12567">
<summary>
Send and receive asterisk_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_asterisk_client_packets" lineno="12583">
<summary>
Do not audit attempts to send and receive asterisk_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_asterisk_client_packets" lineno="12598">
<summary>
Relabel packets to asterisk_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_asterisk_server_packets" lineno="12618">
<summary>
Send asterisk_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_asterisk_server_packets" lineno="12637">
<summary>
Do not audit attempts to send asterisk_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_asterisk_server_packets" lineno="12656">
<summary>
Receive asterisk_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_asterisk_server_packets" lineno="12675">
<summary>
Do not audit attempts to receive asterisk_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_asterisk_server_packets" lineno="12694">
<summary>
Send and receive asterisk_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_asterisk_server_packets" lineno="12710">
<summary>
Do not audit attempts to send and receive asterisk_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_asterisk_server_packets" lineno="12725">
<summary>
Relabel packets to asterisk_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_audit_port" lineno="12747">
<summary>
Send and receive TCP traffic on the audit port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_audit_port" lineno="12766">
<summary>
Send UDP traffic on the audit port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_audit_port" lineno="12785">
<summary>
Do not audit attempts to send UDP traffic on the audit port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_audit_port" lineno="12804">
<summary>
Receive UDP traffic on the audit port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_audit_port" lineno="12823">
<summary>
Do not audit attempts to receive UDP traffic on the audit port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_audit_port" lineno="12842">
<summary>
Send and receive UDP traffic on the audit port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_audit_port" lineno="12859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the audit port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_audit_port" lineno="12875">
<summary>
Bind TCP sockets to the audit port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_audit_port" lineno="12895">
<summary>
Bind UDP sockets to the audit port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_audit_port" lineno="12915">
<summary>
Do not audit attempts to sbind to audit port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_audit_port" lineno="12934">
<summary>
Make a TCP connection to the audit port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_audit_port" lineno="12951">
<summary>
Do not audit attempts to make a TCP connection to audit port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_audit_client_packets" lineno="12971">
<summary>
Send audit_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_audit_client_packets" lineno="12990">
<summary>
Do not audit attempts to send audit_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_audit_client_packets" lineno="13009">
<summary>
Receive audit_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_audit_client_packets" lineno="13028">
<summary>
Do not audit attempts to receive audit_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_audit_client_packets" lineno="13047">
<summary>
Send and receive audit_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_audit_client_packets" lineno="13063">
<summary>
Do not audit attempts to send and receive audit_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_audit_client_packets" lineno="13078">
<summary>
Relabel packets to audit_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_audit_server_packets" lineno="13098">
<summary>
Send audit_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_audit_server_packets" lineno="13117">
<summary>
Do not audit attempts to send audit_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_audit_server_packets" lineno="13136">
<summary>
Receive audit_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_audit_server_packets" lineno="13155">
<summary>
Do not audit attempts to receive audit_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_audit_server_packets" lineno="13174">
<summary>
Send and receive audit_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_audit_server_packets" lineno="13190">
<summary>
Do not audit attempts to send and receive audit_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_audit_server_packets" lineno="13205">
<summary>
Relabel packets to audit_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_auth_port" lineno="13227">
<summary>
Send and receive TCP traffic on the auth port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_auth_port" lineno="13246">
<summary>
Send UDP traffic on the auth port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_auth_port" lineno="13265">
<summary>
Do not audit attempts to send UDP traffic on the auth port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_auth_port" lineno="13284">
<summary>
Receive UDP traffic on the auth port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_auth_port" lineno="13303">
<summary>
Do not audit attempts to receive UDP traffic on the auth port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_auth_port" lineno="13322">
<summary>
Send and receive UDP traffic on the auth port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_auth_port" lineno="13339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the auth port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_auth_port" lineno="13355">
<summary>
Bind TCP sockets to the auth port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_auth_port" lineno="13375">
<summary>
Bind UDP sockets to the auth port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_auth_port" lineno="13395">
<summary>
Do not audit attempts to sbind to auth port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_auth_port" lineno="13414">
<summary>
Make a TCP connection to the auth port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_auth_port" lineno="13431">
<summary>
Do not audit attempts to make a TCP connection to auth port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_auth_client_packets" lineno="13451">
<summary>
Send auth_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_auth_client_packets" lineno="13470">
<summary>
Do not audit attempts to send auth_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_auth_client_packets" lineno="13489">
<summary>
Receive auth_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_auth_client_packets" lineno="13508">
<summary>
Do not audit attempts to receive auth_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_auth_client_packets" lineno="13527">
<summary>
Send and receive auth_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_auth_client_packets" lineno="13543">
<summary>
Do not audit attempts to send and receive auth_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_auth_client_packets" lineno="13558">
<summary>
Relabel packets to auth_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_auth_server_packets" lineno="13578">
<summary>
Send auth_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_auth_server_packets" lineno="13597">
<summary>
Do not audit attempts to send auth_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_auth_server_packets" lineno="13616">
<summary>
Receive auth_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_auth_server_packets" lineno="13635">
<summary>
Do not audit attempts to receive auth_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_auth_server_packets" lineno="13654">
<summary>
Send and receive auth_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_auth_server_packets" lineno="13670">
<summary>
Do not audit attempts to send and receive auth_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_auth_server_packets" lineno="13685">
<summary>
Relabel packets to auth_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_bacula_port" lineno="13707">
<summary>
Send and receive TCP traffic on the bacula port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_bacula_port" lineno="13726">
<summary>
Send UDP traffic on the bacula port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_bacula_port" lineno="13745">
<summary>
Do not audit attempts to send UDP traffic on the bacula port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_bacula_port" lineno="13764">
<summary>
Receive UDP traffic on the bacula port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_bacula_port" lineno="13783">
<summary>
Do not audit attempts to receive UDP traffic on the bacula port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_bacula_port" lineno="13802">
<summary>
Send and receive UDP traffic on the bacula port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_bacula_port" lineno="13819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bacula port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_bacula_port" lineno="13835">
<summary>
Bind TCP sockets to the bacula port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_bacula_port" lineno="13855">
<summary>
Bind UDP sockets to the bacula port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_bacula_port" lineno="13875">
<summary>
Do not audit attempts to sbind to bacula port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_bacula_port" lineno="13894">
<summary>
Make a TCP connection to the bacula port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_bacula_port" lineno="13911">
<summary>
Do not audit attempts to make a TCP connection to bacula port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bacula_client_packets" lineno="13931">
<summary>
Send bacula_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bacula_client_packets" lineno="13950">
<summary>
Do not audit attempts to send bacula_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bacula_client_packets" lineno="13969">
<summary>
Receive bacula_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bacula_client_packets" lineno="13988">
<summary>
Do not audit attempts to receive bacula_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bacula_client_packets" lineno="14007">
<summary>
Send and receive bacula_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bacula_client_packets" lineno="14023">
<summary>
Do not audit attempts to send and receive bacula_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bacula_client_packets" lineno="14038">
<summary>
Relabel packets to bacula_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bacula_server_packets" lineno="14058">
<summary>
Send bacula_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bacula_server_packets" lineno="14077">
<summary>
Do not audit attempts to send bacula_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bacula_server_packets" lineno="14096">
<summary>
Receive bacula_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bacula_server_packets" lineno="14115">
<summary>
Do not audit attempts to receive bacula_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bacula_server_packets" lineno="14134">
<summary>
Send and receive bacula_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bacula_server_packets" lineno="14150">
<summary>
Do not audit attempts to send and receive bacula_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bacula_server_packets" lineno="14165">
<summary>
Relabel packets to bacula_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_babel_port" lineno="14187">
<summary>
Send and receive TCP traffic on the babel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_babel_port" lineno="14206">
<summary>
Send UDP traffic on the babel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_babel_port" lineno="14225">
<summary>
Do not audit attempts to send UDP traffic on the babel port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_babel_port" lineno="14244">
<summary>
Receive UDP traffic on the babel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_babel_port" lineno="14263">
<summary>
Do not audit attempts to receive UDP traffic on the babel port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_babel_port" lineno="14282">
<summary>
Send and receive UDP traffic on the babel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_babel_port" lineno="14299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the babel port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_babel_port" lineno="14315">
<summary>
Bind TCP sockets to the babel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_babel_port" lineno="14335">
<summary>
Bind UDP sockets to the babel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_babel_port" lineno="14355">
<summary>
Do not audit attempts to sbind to babel port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_babel_port" lineno="14374">
<summary>
Make a TCP connection to the babel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_babel_port" lineno="14391">
<summary>
Do not audit attempts to make a TCP connection to babel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_babel_client_packets" lineno="14411">
<summary>
Send babel_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_babel_client_packets" lineno="14430">
<summary>
Do not audit attempts to send babel_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_babel_client_packets" lineno="14449">
<summary>
Receive babel_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_babel_client_packets" lineno="14468">
<summary>
Do not audit attempts to receive babel_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_babel_client_packets" lineno="14487">
<summary>
Send and receive babel_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_babel_client_packets" lineno="14503">
<summary>
Do not audit attempts to send and receive babel_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_babel_client_packets" lineno="14518">
<summary>
Relabel packets to babel_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_babel_server_packets" lineno="14538">
<summary>
Send babel_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_babel_server_packets" lineno="14557">
<summary>
Do not audit attempts to send babel_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_babel_server_packets" lineno="14576">
<summary>
Receive babel_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_babel_server_packets" lineno="14595">
<summary>
Do not audit attempts to receive babel_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_babel_server_packets" lineno="14614">
<summary>
Send and receive babel_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_babel_server_packets" lineno="14630">
<summary>
Do not audit attempts to send and receive babel_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_babel_server_packets" lineno="14645">
<summary>
Relabel packets to babel_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_bctp_port" lineno="14667">
<summary>
Send and receive TCP traffic on the bctp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_bctp_port" lineno="14686">
<summary>
Send UDP traffic on the bctp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_bctp_port" lineno="14705">
<summary>
Do not audit attempts to send UDP traffic on the bctp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_bctp_port" lineno="14724">
<summary>
Receive UDP traffic on the bctp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_bctp_port" lineno="14743">
<summary>
Do not audit attempts to receive UDP traffic on the bctp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_bctp_port" lineno="14762">
<summary>
Send and receive UDP traffic on the bctp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_bctp_port" lineno="14779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bctp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_bctp_port" lineno="14795">
<summary>
Bind TCP sockets to the bctp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_bctp_port" lineno="14815">
<summary>
Bind UDP sockets to the bctp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_bctp_port" lineno="14835">
<summary>
Do not audit attempts to sbind to bctp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_bctp_port" lineno="14854">
<summary>
Make a TCP connection to the bctp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_bctp_port" lineno="14871">
<summary>
Do not audit attempts to make a TCP connection to bctp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bctp_client_packets" lineno="14891">
<summary>
Send bctp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bctp_client_packets" lineno="14910">
<summary>
Do not audit attempts to send bctp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bctp_client_packets" lineno="14929">
<summary>
Receive bctp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bctp_client_packets" lineno="14948">
<summary>
Do not audit attempts to receive bctp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bctp_client_packets" lineno="14967">
<summary>
Send and receive bctp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bctp_client_packets" lineno="14983">
<summary>
Do not audit attempts to send and receive bctp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bctp_client_packets" lineno="14998">
<summary>
Relabel packets to bctp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bctp_server_packets" lineno="15018">
<summary>
Send bctp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bctp_server_packets" lineno="15037">
<summary>
Do not audit attempts to send bctp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bctp_server_packets" lineno="15056">
<summary>
Receive bctp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bctp_server_packets" lineno="15075">
<summary>
Do not audit attempts to receive bctp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bctp_server_packets" lineno="15094">
<summary>
Send and receive bctp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bctp_server_packets" lineno="15110">
<summary>
Do not audit attempts to send and receive bctp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bctp_server_packets" lineno="15125">
<summary>
Relabel packets to bctp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_bfd_control_port" lineno="15147">
<summary>
Send and receive TCP traffic on the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_bfd_control_port" lineno="15166">
<summary>
Send UDP traffic on the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_bfd_control_port" lineno="15185">
<summary>
Do not audit attempts to send UDP traffic on the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_bfd_control_port" lineno="15204">
<summary>
Receive UDP traffic on the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_bfd_control_port" lineno="15223">
<summary>
Do not audit attempts to receive UDP traffic on the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_bfd_control_port" lineno="15242">
<summary>
Send and receive UDP traffic on the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_bfd_control_port" lineno="15259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_bfd_control_port" lineno="15275">
<summary>
Bind TCP sockets to the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_bfd_control_port" lineno="15295">
<summary>
Bind UDP sockets to the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_bfd_control_port" lineno="15315">
<summary>
Do not audit attempts to sbind to bfd_control port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_bfd_control_port" lineno="15334">
<summary>
Make a TCP connection to the bfd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_bfd_control_port" lineno="15351">
<summary>
Do not audit attempts to make a TCP connection to bfd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bfd_control_client_packets" lineno="15371">
<summary>
Send bfd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bfd_control_client_packets" lineno="15390">
<summary>
Do not audit attempts to send bfd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bfd_control_client_packets" lineno="15409">
<summary>
Receive bfd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bfd_control_client_packets" lineno="15428">
<summary>
Do not audit attempts to receive bfd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bfd_control_client_packets" lineno="15447">
<summary>
Send and receive bfd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bfd_control_client_packets" lineno="15463">
<summary>
Do not audit attempts to send and receive bfd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bfd_control_client_packets" lineno="15478">
<summary>
Relabel packets to bfd_control_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bfd_control_server_packets" lineno="15498">
<summary>
Send bfd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bfd_control_server_packets" lineno="15517">
<summary>
Do not audit attempts to send bfd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bfd_control_server_packets" lineno="15536">
<summary>
Receive bfd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bfd_control_server_packets" lineno="15555">
<summary>
Do not audit attempts to receive bfd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bfd_control_server_packets" lineno="15574">
<summary>
Send and receive bfd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bfd_control_server_packets" lineno="15590">
<summary>
Do not audit attempts to send and receive bfd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bfd_control_server_packets" lineno="15605">
<summary>
Relabel packets to bfd_control_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_bfd_echo_port" lineno="15627">
<summary>
Send and receive TCP traffic on the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_bfd_echo_port" lineno="15646">
<summary>
Send UDP traffic on the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_bfd_echo_port" lineno="15665">
<summary>
Do not audit attempts to send UDP traffic on the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_bfd_echo_port" lineno="15684">
<summary>
Receive UDP traffic on the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_bfd_echo_port" lineno="15703">
<summary>
Do not audit attempts to receive UDP traffic on the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_bfd_echo_port" lineno="15722">
<summary>
Send and receive UDP traffic on the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_bfd_echo_port" lineno="15739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_bfd_echo_port" lineno="15755">
<summary>
Bind TCP sockets to the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_bfd_echo_port" lineno="15775">
<summary>
Bind UDP sockets to the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_bfd_echo_port" lineno="15795">
<summary>
Do not audit attempts to sbind to bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_bfd_echo_port" lineno="15814">
<summary>
Make a TCP connection to the bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_bfd_echo_port" lineno="15831">
<summary>
Do not audit attempts to make a TCP connection to bfd_echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bfd_echo_client_packets" lineno="15851">
<summary>
Send bfd_echo_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bfd_echo_client_packets" lineno="15870">
<summary>
Do not audit attempts to send bfd_echo_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bfd_echo_client_packets" lineno="15889">
<summary>
Receive bfd_echo_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bfd_echo_client_packets" lineno="15908">
<summary>
Do not audit attempts to receive bfd_echo_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bfd_echo_client_packets" lineno="15927">
<summary>
Send and receive bfd_echo_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bfd_echo_client_packets" lineno="15943">
<summary>
Do not audit attempts to send and receive bfd_echo_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bfd_echo_client_packets" lineno="15958">
<summary>
Relabel packets to bfd_echo_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bfd_echo_server_packets" lineno="15978">
<summary>
Send bfd_echo_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bfd_echo_server_packets" lineno="15997">
<summary>
Do not audit attempts to send bfd_echo_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bfd_echo_server_packets" lineno="16016">
<summary>
Receive bfd_echo_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bfd_echo_server_packets" lineno="16035">
<summary>
Do not audit attempts to receive bfd_echo_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bfd_echo_server_packets" lineno="16054">
<summary>
Send and receive bfd_echo_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bfd_echo_server_packets" lineno="16070">
<summary>
Do not audit attempts to send and receive bfd_echo_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bfd_echo_server_packets" lineno="16085">
<summary>
Relabel packets to bfd_echo_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_bfd_multi_port" lineno="16107">
<summary>
Send and receive TCP traffic on the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_bfd_multi_port" lineno="16126">
<summary>
Send UDP traffic on the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_bfd_multi_port" lineno="16145">
<summary>
Do not audit attempts to send UDP traffic on the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_bfd_multi_port" lineno="16164">
<summary>
Receive UDP traffic on the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_bfd_multi_port" lineno="16183">
<summary>
Do not audit attempts to receive UDP traffic on the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_bfd_multi_port" lineno="16202">
<summary>
Send and receive UDP traffic on the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_bfd_multi_port" lineno="16219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_bfd_multi_port" lineno="16235">
<summary>
Bind TCP sockets to the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_bfd_multi_port" lineno="16255">
<summary>
Bind UDP sockets to the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_bfd_multi_port" lineno="16275">
<summary>
Do not audit attempts to sbind to bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_bfd_multi_port" lineno="16294">
<summary>
Make a TCP connection to the bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_bfd_multi_port" lineno="16311">
<summary>
Do not audit attempts to make a TCP connection to bfd_multi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bfd_multi_client_packets" lineno="16331">
<summary>
Send bfd_multi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bfd_multi_client_packets" lineno="16350">
<summary>
Do not audit attempts to send bfd_multi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bfd_multi_client_packets" lineno="16369">
<summary>
Receive bfd_multi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bfd_multi_client_packets" lineno="16388">
<summary>
Do not audit attempts to receive bfd_multi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bfd_multi_client_packets" lineno="16407">
<summary>
Send and receive bfd_multi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bfd_multi_client_packets" lineno="16423">
<summary>
Do not audit attempts to send and receive bfd_multi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bfd_multi_client_packets" lineno="16438">
<summary>
Relabel packets to bfd_multi_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bfd_multi_server_packets" lineno="16458">
<summary>
Send bfd_multi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bfd_multi_server_packets" lineno="16477">
<summary>
Do not audit attempts to send bfd_multi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bfd_multi_server_packets" lineno="16496">
<summary>
Receive bfd_multi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bfd_multi_server_packets" lineno="16515">
<summary>
Do not audit attempts to receive bfd_multi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bfd_multi_server_packets" lineno="16534">
<summary>
Send and receive bfd_multi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bfd_multi_server_packets" lineno="16550">
<summary>
Do not audit attempts to send and receive bfd_multi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bfd_multi_server_packets" lineno="16565">
<summary>
Relabel packets to bfd_multi_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_bgp_port" lineno="16587">
<summary>
Send and receive TCP traffic on the bgp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_bgp_port" lineno="16606">
<summary>
Send UDP traffic on the bgp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_bgp_port" lineno="16625">
<summary>
Do not audit attempts to send UDP traffic on the bgp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_bgp_port" lineno="16644">
<summary>
Receive UDP traffic on the bgp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_bgp_port" lineno="16663">
<summary>
Do not audit attempts to receive UDP traffic on the bgp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_bgp_port" lineno="16682">
<summary>
Send and receive UDP traffic on the bgp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_bgp_port" lineno="16699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the bgp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_bgp_port" lineno="16715">
<summary>
Bind TCP sockets to the bgp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_bgp_port" lineno="16735">
<summary>
Bind UDP sockets to the bgp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_bgp_port" lineno="16755">
<summary>
Do not audit attempts to sbind to bgp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_bgp_port" lineno="16774">
<summary>
Make a TCP connection to the bgp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_bgp_port" lineno="16791">
<summary>
Do not audit attempts to make a TCP connection to bgp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bgp_client_packets" lineno="16811">
<summary>
Send bgp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bgp_client_packets" lineno="16830">
<summary>
Do not audit attempts to send bgp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bgp_client_packets" lineno="16849">
<summary>
Receive bgp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bgp_client_packets" lineno="16868">
<summary>
Do not audit attempts to receive bgp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bgp_client_packets" lineno="16887">
<summary>
Send and receive bgp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bgp_client_packets" lineno="16903">
<summary>
Do not audit attempts to send and receive bgp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bgp_client_packets" lineno="16918">
<summary>
Relabel packets to bgp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_bgp_server_packets" lineno="16938">
<summary>
Send bgp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_bgp_server_packets" lineno="16957">
<summary>
Do not audit attempts to send bgp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_bgp_server_packets" lineno="16976">
<summary>
Receive bgp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_bgp_server_packets" lineno="16995">
<summary>
Do not audit attempts to receive bgp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_bgp_server_packets" lineno="17014">
<summary>
Send and receive bgp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_bgp_server_packets" lineno="17030">
<summary>
Do not audit attempts to send and receive bgp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_bgp_server_packets" lineno="17045">
<summary>
Relabel packets to bgp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_boinc_port" lineno="17067">
<summary>
Send and receive TCP traffic on the boinc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_boinc_port" lineno="17086">
<summary>
Send UDP traffic on the boinc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_boinc_port" lineno="17105">
<summary>
Do not audit attempts to send UDP traffic on the boinc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_boinc_port" lineno="17124">
<summary>
Receive UDP traffic on the boinc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_boinc_port" lineno="17143">
<summary>
Do not audit attempts to receive UDP traffic on the boinc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_boinc_port" lineno="17162">
<summary>
Send and receive UDP traffic on the boinc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_boinc_port" lineno="17179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the boinc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_boinc_port" lineno="17195">
<summary>
Bind TCP sockets to the boinc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_boinc_port" lineno="17215">
<summary>
Bind UDP sockets to the boinc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_boinc_port" lineno="17235">
<summary>
Do not audit attempts to sbind to boinc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_boinc_port" lineno="17254">
<summary>
Make a TCP connection to the boinc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_boinc_port" lineno="17271">
<summary>
Do not audit attempts to make a TCP connection to boinc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_boinc_client_packets" lineno="17291">
<summary>
Send boinc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_boinc_client_packets" lineno="17310">
<summary>
Do not audit attempts to send boinc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_boinc_client_packets" lineno="17329">
<summary>
Receive boinc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_boinc_client_packets" lineno="17348">
<summary>
Do not audit attempts to receive boinc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_boinc_client_packets" lineno="17367">
<summary>
Send and receive boinc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_boinc_client_packets" lineno="17383">
<summary>
Do not audit attempts to send and receive boinc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_boinc_client_packets" lineno="17398">
<summary>
Relabel packets to boinc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_boinc_server_packets" lineno="17418">
<summary>
Send boinc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_boinc_server_packets" lineno="17437">
<summary>
Do not audit attempts to send boinc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_boinc_server_packets" lineno="17456">
<summary>
Receive boinc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_boinc_server_packets" lineno="17475">
<summary>
Do not audit attempts to receive boinc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_boinc_server_packets" lineno="17494">
<summary>
Send and receive boinc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_boinc_server_packets" lineno="17510">
<summary>
Do not audit attempts to send and receive boinc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_boinc_server_packets" lineno="17525">
<summary>
Relabel packets to boinc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_boinc_client_port" lineno="17547">
<summary>
Send and receive TCP traffic on the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_boinc_client_port" lineno="17566">
<summary>
Send UDP traffic on the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_boinc_client_port" lineno="17585">
<summary>
Do not audit attempts to send UDP traffic on the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_boinc_client_port" lineno="17604">
<summary>
Receive UDP traffic on the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_boinc_client_port" lineno="17623">
<summary>
Do not audit attempts to receive UDP traffic on the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_boinc_client_port" lineno="17642">
<summary>
Send and receive UDP traffic on the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_boinc_client_port" lineno="17659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_boinc_client_port" lineno="17675">
<summary>
Bind TCP sockets to the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_boinc_client_port" lineno="17695">
<summary>
Bind UDP sockets to the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_boinc_client_port" lineno="17715">
<summary>
Do not audit attempts to sbind to boinc_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_boinc_client_port" lineno="17734">
<summary>
Make a TCP connection to the boinc_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_boinc_client_port" lineno="17751">
<summary>
Do not audit attempts to make a TCP connection to boinc_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_boinc_client_client_packets" lineno="17771">
<summary>
Send boinc_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_boinc_client_client_packets" lineno="17790">
<summary>
Do not audit attempts to send boinc_client_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_boinc_client_client_packets" lineno="17809">
<summary>
Receive boinc_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_boinc_client_client_packets" lineno="17828">
<summary>
Do not audit attempts to receive boinc_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_boinc_client_client_packets" lineno="17847">
<summary>
Send and receive boinc_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_boinc_client_client_packets" lineno="17863">
<summary>
Do not audit attempts to send and receive boinc_client_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_boinc_client_client_packets" lineno="17878">
<summary>
Relabel packets to boinc_client_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_boinc_client_server_packets" lineno="17898">
<summary>
Send boinc_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_boinc_client_server_packets" lineno="17917">
<summary>
Do not audit attempts to send boinc_client_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_boinc_client_server_packets" lineno="17936">
<summary>
Receive boinc_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_boinc_client_server_packets" lineno="17955">
<summary>
Do not audit attempts to receive boinc_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_boinc_client_server_packets" lineno="17974">
<summary>
Send and receive boinc_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_boinc_client_server_packets" lineno="17990">
<summary>
Do not audit attempts to send and receive boinc_client_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_boinc_client_server_packets" lineno="18005">
<summary>
Relabel packets to boinc_client_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_boothd_port" lineno="18027">
<summary>
Send and receive TCP traffic on the boothd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_boothd_port" lineno="18046">
<summary>
Send UDP traffic on the boothd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_boothd_port" lineno="18065">
<summary>
Do not audit attempts to send UDP traffic on the boothd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_boothd_port" lineno="18084">
<summary>
Receive UDP traffic on the boothd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_boothd_port" lineno="18103">
<summary>
Do not audit attempts to receive UDP traffic on the boothd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_boothd_port" lineno="18122">
<summary>
Send and receive UDP traffic on the boothd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_boothd_port" lineno="18139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the boothd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_boothd_port" lineno="18155">
<summary>
Bind TCP sockets to the boothd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_boothd_port" lineno="18175">
<summary>
Bind UDP sockets to the boothd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_boothd_port" lineno="18195">
<summary>
Do not audit attempts to sbind to boothd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_boothd_port" lineno="18214">
<summary>
Make a TCP connection to the boothd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_boothd_port" lineno="18231">
<summary>
Do not audit attempts to make a TCP connection to boothd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_boothd_client_packets" lineno="18251">
<summary>
Send boothd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_boothd_client_packets" lineno="18270">
<summary>
Do not audit attempts to send boothd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_boothd_client_packets" lineno="18289">
<summary>
Receive boothd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_boothd_client_packets" lineno="18308">
<summary>
Do not audit attempts to receive boothd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_boothd_client_packets" lineno="18327">
<summary>
Send and receive boothd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_boothd_client_packets" lineno="18343">
<summary>
Do not audit attempts to send and receive boothd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_boothd_client_packets" lineno="18358">
<summary>
Relabel packets to boothd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_boothd_server_packets" lineno="18378">
<summary>
Send boothd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_boothd_server_packets" lineno="18397">
<summary>
Do not audit attempts to send boothd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_boothd_server_packets" lineno="18416">
<summary>
Receive boothd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_boothd_server_packets" lineno="18435">
<summary>
Do not audit attempts to receive boothd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_boothd_server_packets" lineno="18454">
<summary>
Send and receive boothd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_boothd_server_packets" lineno="18470">
<summary>
Do not audit attempts to send and receive boothd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_boothd_server_packets" lineno="18485">
<summary>
Relabel packets to boothd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_brlp_port" lineno="18507">
<summary>
Send and receive TCP traffic on the brlp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_brlp_port" lineno="18526">
<summary>
Send UDP traffic on the brlp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_brlp_port" lineno="18545">
<summary>
Do not audit attempts to send UDP traffic on the brlp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_brlp_port" lineno="18564">
<summary>
Receive UDP traffic on the brlp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_brlp_port" lineno="18583">
<summary>
Do not audit attempts to receive UDP traffic on the brlp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_brlp_port" lineno="18602">
<summary>
Send and receive UDP traffic on the brlp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_brlp_port" lineno="18619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the brlp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_brlp_port" lineno="18635">
<summary>
Bind TCP sockets to the brlp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_brlp_port" lineno="18655">
<summary>
Bind UDP sockets to the brlp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_brlp_port" lineno="18675">
<summary>
Do not audit attempts to sbind to brlp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_brlp_port" lineno="18694">
<summary>
Make a TCP connection to the brlp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_brlp_port" lineno="18711">
<summary>
Do not audit attempts to make a TCP connection to brlp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_brlp_client_packets" lineno="18731">
<summary>
Send brlp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_brlp_client_packets" lineno="18750">
<summary>
Do not audit attempts to send brlp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_brlp_client_packets" lineno="18769">
<summary>
Receive brlp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_brlp_client_packets" lineno="18788">
<summary>
Do not audit attempts to receive brlp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_brlp_client_packets" lineno="18807">
<summary>
Send and receive brlp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_brlp_client_packets" lineno="18823">
<summary>
Do not audit attempts to send and receive brlp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_brlp_client_packets" lineno="18838">
<summary>
Relabel packets to brlp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_brlp_server_packets" lineno="18858">
<summary>
Send brlp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_brlp_server_packets" lineno="18877">
<summary>
Do not audit attempts to send brlp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_brlp_server_packets" lineno="18896">
<summary>
Receive brlp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_brlp_server_packets" lineno="18915">
<summary>
Do not audit attempts to receive brlp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_brlp_server_packets" lineno="18934">
<summary>
Send and receive brlp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_brlp_server_packets" lineno="18950">
<summary>
Do not audit attempts to send and receive brlp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_brlp_server_packets" lineno="18965">
<summary>
Relabel packets to brlp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_biff_port" lineno="18987">
<summary>
Send and receive TCP traffic on the biff port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_biff_port" lineno="19006">
<summary>
Send UDP traffic on the biff port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_biff_port" lineno="19025">
<summary>
Do not audit attempts to send UDP traffic on the biff port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_biff_port" lineno="19044">
<summary>
Receive UDP traffic on the biff port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_biff_port" lineno="19063">
<summary>
Do not audit attempts to receive UDP traffic on the biff port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_biff_port" lineno="19082">
<summary>
Send and receive UDP traffic on the biff port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_biff_port" lineno="19099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the biff port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_biff_port" lineno="19115">
<summary>
Bind TCP sockets to the biff port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_biff_port" lineno="19135">
<summary>
Bind UDP sockets to the biff port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_biff_port" lineno="19155">
<summary>
Do not audit attempts to sbind to biff port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_biff_port" lineno="19174">
<summary>
Make a TCP connection to the biff port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_biff_port" lineno="19191">
<summary>
Do not audit attempts to make a TCP connection to biff port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_biff_client_packets" lineno="19211">
<summary>
Send biff_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_biff_client_packets" lineno="19230">
<summary>
Do not audit attempts to send biff_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_biff_client_packets" lineno="19249">
<summary>
Receive biff_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_biff_client_packets" lineno="19268">
<summary>
Do not audit attempts to receive biff_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_biff_client_packets" lineno="19287">
<summary>
Send and receive biff_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_biff_client_packets" lineno="19303">
<summary>
Do not audit attempts to send and receive biff_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_biff_client_packets" lineno="19318">
<summary>
Relabel packets to biff_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_biff_server_packets" lineno="19338">
<summary>
Send biff_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_biff_server_packets" lineno="19357">
<summary>
Do not audit attempts to send biff_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_biff_server_packets" lineno="19376">
<summary>
Receive biff_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_biff_server_packets" lineno="19395">
<summary>
Do not audit attempts to receive biff_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_biff_server_packets" lineno="19414">
<summary>
Send and receive biff_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_biff_server_packets" lineno="19430">
<summary>
Do not audit attempts to send and receive biff_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_biff_server_packets" lineno="19445">
<summary>
Relabel packets to biff_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_certmaster_port" lineno="19467">
<summary>
Send and receive TCP traffic on the certmaster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_certmaster_port" lineno="19486">
<summary>
Send UDP traffic on the certmaster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_certmaster_port" lineno="19505">
<summary>
Do not audit attempts to send UDP traffic on the certmaster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_certmaster_port" lineno="19524">
<summary>
Receive UDP traffic on the certmaster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_certmaster_port" lineno="19543">
<summary>
Do not audit attempts to receive UDP traffic on the certmaster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_certmaster_port" lineno="19562">
<summary>
Send and receive UDP traffic on the certmaster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_certmaster_port" lineno="19579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the certmaster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_certmaster_port" lineno="19595">
<summary>
Bind TCP sockets to the certmaster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_certmaster_port" lineno="19615">
<summary>
Bind UDP sockets to the certmaster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_certmaster_port" lineno="19635">
<summary>
Do not audit attempts to sbind to certmaster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_certmaster_port" lineno="19654">
<summary>
Make a TCP connection to the certmaster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_certmaster_port" lineno="19671">
<summary>
Do not audit attempts to make a TCP connection to certmaster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_certmaster_client_packets" lineno="19691">
<summary>
Send certmaster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_certmaster_client_packets" lineno="19710">
<summary>
Do not audit attempts to send certmaster_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_certmaster_client_packets" lineno="19729">
<summary>
Receive certmaster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_certmaster_client_packets" lineno="19748">
<summary>
Do not audit attempts to receive certmaster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_certmaster_client_packets" lineno="19767">
<summary>
Send and receive certmaster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_certmaster_client_packets" lineno="19783">
<summary>
Do not audit attempts to send and receive certmaster_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_certmaster_client_packets" lineno="19798">
<summary>
Relabel packets to certmaster_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_certmaster_server_packets" lineno="19818">
<summary>
Send certmaster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_certmaster_server_packets" lineno="19837">
<summary>
Do not audit attempts to send certmaster_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_certmaster_server_packets" lineno="19856">
<summary>
Receive certmaster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_certmaster_server_packets" lineno="19875">
<summary>
Do not audit attempts to receive certmaster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_certmaster_server_packets" lineno="19894">
<summary>
Send and receive certmaster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_certmaster_server_packets" lineno="19910">
<summary>
Do not audit attempts to send and receive certmaster_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_certmaster_server_packets" lineno="19925">
<summary>
Relabel packets to certmaster_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_collectd_port" lineno="19947">
<summary>
Send and receive TCP traffic on the collectd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_collectd_port" lineno="19966">
<summary>
Send UDP traffic on the collectd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_collectd_port" lineno="19985">
<summary>
Do not audit attempts to send UDP traffic on the collectd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_collectd_port" lineno="20004">
<summary>
Receive UDP traffic on the collectd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_collectd_port" lineno="20023">
<summary>
Do not audit attempts to receive UDP traffic on the collectd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_collectd_port" lineno="20042">
<summary>
Send and receive UDP traffic on the collectd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_collectd_port" lineno="20059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the collectd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_collectd_port" lineno="20075">
<summary>
Bind TCP sockets to the collectd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_collectd_port" lineno="20095">
<summary>
Bind UDP sockets to the collectd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_collectd_port" lineno="20115">
<summary>
Do not audit attempts to sbind to collectd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_collectd_port" lineno="20134">
<summary>
Make a TCP connection to the collectd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_collectd_port" lineno="20151">
<summary>
Do not audit attempts to make a TCP connection to collectd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_collectd_client_packets" lineno="20171">
<summary>
Send collectd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_collectd_client_packets" lineno="20190">
<summary>
Do not audit attempts to send collectd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_collectd_client_packets" lineno="20209">
<summary>
Receive collectd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_collectd_client_packets" lineno="20228">
<summary>
Do not audit attempts to receive collectd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_collectd_client_packets" lineno="20247">
<summary>
Send and receive collectd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_collectd_client_packets" lineno="20263">
<summary>
Do not audit attempts to send and receive collectd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_collectd_client_packets" lineno="20278">
<summary>
Relabel packets to collectd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_collectd_server_packets" lineno="20298">
<summary>
Send collectd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_collectd_server_packets" lineno="20317">
<summary>
Do not audit attempts to send collectd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_collectd_server_packets" lineno="20336">
<summary>
Receive collectd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_collectd_server_packets" lineno="20355">
<summary>
Do not audit attempts to receive collectd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_collectd_server_packets" lineno="20374">
<summary>
Send and receive collectd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_collectd_server_packets" lineno="20390">
<summary>
Do not audit attempts to send and receive collectd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_collectd_server_packets" lineno="20405">
<summary>
Relabel packets to collectd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_chronyd_port" lineno="20427">
<summary>
Send and receive TCP traffic on the chronyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_chronyd_port" lineno="20446">
<summary>
Send UDP traffic on the chronyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_chronyd_port" lineno="20465">
<summary>
Do not audit attempts to send UDP traffic on the chronyd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_chronyd_port" lineno="20484">
<summary>
Receive UDP traffic on the chronyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_chronyd_port" lineno="20503">
<summary>
Do not audit attempts to receive UDP traffic on the chronyd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_chronyd_port" lineno="20522">
<summary>
Send and receive UDP traffic on the chronyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_chronyd_port" lineno="20539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the chronyd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_chronyd_port" lineno="20555">
<summary>
Bind TCP sockets to the chronyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_chronyd_port" lineno="20575">
<summary>
Bind UDP sockets to the chronyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_chronyd_port" lineno="20595">
<summary>
Do not audit attempts to sbind to chronyd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_chronyd_port" lineno="20614">
<summary>
Make a TCP connection to the chronyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_chronyd_port" lineno="20631">
<summary>
Do not audit attempts to make a TCP connection to chronyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_chronyd_client_packets" lineno="20651">
<summary>
Send chronyd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_chronyd_client_packets" lineno="20670">
<summary>
Do not audit attempts to send chronyd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_chronyd_client_packets" lineno="20689">
<summary>
Receive chronyd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_chronyd_client_packets" lineno="20708">
<summary>
Do not audit attempts to receive chronyd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_chronyd_client_packets" lineno="20727">
<summary>
Send and receive chronyd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_chronyd_client_packets" lineno="20743">
<summary>
Do not audit attempts to send and receive chronyd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_chronyd_client_packets" lineno="20758">
<summary>
Relabel packets to chronyd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_chronyd_server_packets" lineno="20778">
<summary>
Send chronyd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_chronyd_server_packets" lineno="20797">
<summary>
Do not audit attempts to send chronyd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_chronyd_server_packets" lineno="20816">
<summary>
Receive chronyd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_chronyd_server_packets" lineno="20835">
<summary>
Do not audit attempts to receive chronyd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_chronyd_server_packets" lineno="20854">
<summary>
Send and receive chronyd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_chronyd_server_packets" lineno="20870">
<summary>
Do not audit attempts to send and receive chronyd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_chronyd_server_packets" lineno="20885">
<summary>
Relabel packets to chronyd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_clamd_port" lineno="20907">
<summary>
Send and receive TCP traffic on the clamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_clamd_port" lineno="20926">
<summary>
Send UDP traffic on the clamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_clamd_port" lineno="20945">
<summary>
Do not audit attempts to send UDP traffic on the clamd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_clamd_port" lineno="20964">
<summary>
Receive UDP traffic on the clamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_clamd_port" lineno="20983">
<summary>
Do not audit attempts to receive UDP traffic on the clamd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_clamd_port" lineno="21002">
<summary>
Send and receive UDP traffic on the clamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_clamd_port" lineno="21019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the clamd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_clamd_port" lineno="21035">
<summary>
Bind TCP sockets to the clamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_clamd_port" lineno="21055">
<summary>
Bind UDP sockets to the clamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_clamd_port" lineno="21075">
<summary>
Do not audit attempts to sbind to clamd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_clamd_port" lineno="21094">
<summary>
Make a TCP connection to the clamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_clamd_port" lineno="21111">
<summary>
Do not audit attempts to make a TCP connection to clamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_clamd_client_packets" lineno="21131">
<summary>
Send clamd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_clamd_client_packets" lineno="21150">
<summary>
Do not audit attempts to send clamd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_clamd_client_packets" lineno="21169">
<summary>
Receive clamd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_clamd_client_packets" lineno="21188">
<summary>
Do not audit attempts to receive clamd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_clamd_client_packets" lineno="21207">
<summary>
Send and receive clamd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_clamd_client_packets" lineno="21223">
<summary>
Do not audit attempts to send and receive clamd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_clamd_client_packets" lineno="21238">
<summary>
Relabel packets to clamd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_clamd_server_packets" lineno="21258">
<summary>
Send clamd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_clamd_server_packets" lineno="21277">
<summary>
Do not audit attempts to send clamd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_clamd_server_packets" lineno="21296">
<summary>
Receive clamd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_clamd_server_packets" lineno="21315">
<summary>
Do not audit attempts to receive clamd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_clamd_server_packets" lineno="21334">
<summary>
Send and receive clamd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_clamd_server_packets" lineno="21350">
<summary>
Do not audit attempts to send and receive clamd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_clamd_server_packets" lineno="21365">
<summary>
Relabel packets to clamd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_clockspeed_port" lineno="21387">
<summary>
Send and receive TCP traffic on the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_clockspeed_port" lineno="21406">
<summary>
Send UDP traffic on the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_clockspeed_port" lineno="21425">
<summary>
Do not audit attempts to send UDP traffic on the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_clockspeed_port" lineno="21444">
<summary>
Receive UDP traffic on the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_clockspeed_port" lineno="21463">
<summary>
Do not audit attempts to receive UDP traffic on the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_clockspeed_port" lineno="21482">
<summary>
Send and receive UDP traffic on the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_clockspeed_port" lineno="21499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_clockspeed_port" lineno="21515">
<summary>
Bind TCP sockets to the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_clockspeed_port" lineno="21535">
<summary>
Bind UDP sockets to the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_clockspeed_port" lineno="21555">
<summary>
Do not audit attempts to sbind to clockspeed port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_clockspeed_port" lineno="21574">
<summary>
Make a TCP connection to the clockspeed port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_clockspeed_port" lineno="21591">
<summary>
Do not audit attempts to make a TCP connection to clockspeed port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_clockspeed_client_packets" lineno="21611">
<summary>
Send clockspeed_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_clockspeed_client_packets" lineno="21630">
<summary>
Do not audit attempts to send clockspeed_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_clockspeed_client_packets" lineno="21649">
<summary>
Receive clockspeed_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_clockspeed_client_packets" lineno="21668">
<summary>
Do not audit attempts to receive clockspeed_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_clockspeed_client_packets" lineno="21687">
<summary>
Send and receive clockspeed_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_clockspeed_client_packets" lineno="21703">
<summary>
Do not audit attempts to send and receive clockspeed_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_clockspeed_client_packets" lineno="21718">
<summary>
Relabel packets to clockspeed_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_clockspeed_server_packets" lineno="21738">
<summary>
Send clockspeed_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_clockspeed_server_packets" lineno="21757">
<summary>
Do not audit attempts to send clockspeed_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_clockspeed_server_packets" lineno="21776">
<summary>
Receive clockspeed_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_clockspeed_server_packets" lineno="21795">
<summary>
Do not audit attempts to receive clockspeed_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_clockspeed_server_packets" lineno="21814">
<summary>
Send and receive clockspeed_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_clockspeed_server_packets" lineno="21830">
<summary>
Do not audit attempts to send and receive clockspeed_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_clockspeed_server_packets" lineno="21845">
<summary>
Relabel packets to clockspeed_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_cluster_port" lineno="21867">
<summary>
Send and receive TCP traffic on the cluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_cluster_port" lineno="21886">
<summary>
Send UDP traffic on the cluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_cluster_port" lineno="21905">
<summary>
Do not audit attempts to send UDP traffic on the cluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_cluster_port" lineno="21924">
<summary>
Receive UDP traffic on the cluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_cluster_port" lineno="21943">
<summary>
Do not audit attempts to receive UDP traffic on the cluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_cluster_port" lineno="21962">
<summary>
Send and receive UDP traffic on the cluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_cluster_port" lineno="21979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_cluster_port" lineno="21995">
<summary>
Bind TCP sockets to the cluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_cluster_port" lineno="22015">
<summary>
Bind UDP sockets to the cluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_cluster_port" lineno="22035">
<summary>
Do not audit attempts to sbind to cluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_cluster_port" lineno="22054">
<summary>
Make a TCP connection to the cluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_cluster_port" lineno="22071">
<summary>
Do not audit attempts to make a TCP connection to cluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cluster_client_packets" lineno="22091">
<summary>
Send cluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cluster_client_packets" lineno="22110">
<summary>
Do not audit attempts to send cluster_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cluster_client_packets" lineno="22129">
<summary>
Receive cluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cluster_client_packets" lineno="22148">
<summary>
Do not audit attempts to receive cluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cluster_client_packets" lineno="22167">
<summary>
Send and receive cluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cluster_client_packets" lineno="22183">
<summary>
Do not audit attempts to send and receive cluster_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cluster_client_packets" lineno="22198">
<summary>
Relabel packets to cluster_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cluster_server_packets" lineno="22218">
<summary>
Send cluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cluster_server_packets" lineno="22237">
<summary>
Do not audit attempts to send cluster_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cluster_server_packets" lineno="22256">
<summary>
Receive cluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cluster_server_packets" lineno="22275">
<summary>
Do not audit attempts to receive cluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cluster_server_packets" lineno="22294">
<summary>
Send and receive cluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cluster_server_packets" lineno="22310">
<summary>
Do not audit attempts to send and receive cluster_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cluster_server_packets" lineno="22325">
<summary>
Relabel packets to cluster_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_cma_port" lineno="22347">
<summary>
Send and receive TCP traffic on the cma port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_cma_port" lineno="22366">
<summary>
Send UDP traffic on the cma port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_cma_port" lineno="22385">
<summary>
Do not audit attempts to send UDP traffic on the cma port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_cma_port" lineno="22404">
<summary>
Receive UDP traffic on the cma port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_cma_port" lineno="22423">
<summary>
Do not audit attempts to receive UDP traffic on the cma port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_cma_port" lineno="22442">
<summary>
Send and receive UDP traffic on the cma port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_cma_port" lineno="22459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cma port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_cma_port" lineno="22475">
<summary>
Bind TCP sockets to the cma port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_cma_port" lineno="22495">
<summary>
Bind UDP sockets to the cma port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_cma_port" lineno="22515">
<summary>
Do not audit attempts to sbind to cma port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_cma_port" lineno="22534">
<summary>
Make a TCP connection to the cma port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_cma_port" lineno="22551">
<summary>
Do not audit attempts to make a TCP connection to cma port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cma_client_packets" lineno="22571">
<summary>
Send cma_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cma_client_packets" lineno="22590">
<summary>
Do not audit attempts to send cma_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cma_client_packets" lineno="22609">
<summary>
Receive cma_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cma_client_packets" lineno="22628">
<summary>
Do not audit attempts to receive cma_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cma_client_packets" lineno="22647">
<summary>
Send and receive cma_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cma_client_packets" lineno="22663">
<summary>
Do not audit attempts to send and receive cma_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cma_client_packets" lineno="22678">
<summary>
Relabel packets to cma_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cma_server_packets" lineno="22698">
<summary>
Send cma_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cma_server_packets" lineno="22717">
<summary>
Do not audit attempts to send cma_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cma_server_packets" lineno="22736">
<summary>
Receive cma_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cma_server_packets" lineno="22755">
<summary>
Do not audit attempts to receive cma_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cma_server_packets" lineno="22774">
<summary>
Send and receive cma_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cma_server_packets" lineno="22790">
<summary>
Do not audit attempts to send and receive cma_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cma_server_packets" lineno="22805">
<summary>
Relabel packets to cma_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_cmadmin_port" lineno="22827">
<summary>
Send and receive TCP traffic on the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_cmadmin_port" lineno="22846">
<summary>
Send UDP traffic on the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_cmadmin_port" lineno="22865">
<summary>
Do not audit attempts to send UDP traffic on the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_cmadmin_port" lineno="22884">
<summary>
Receive UDP traffic on the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_cmadmin_port" lineno="22903">
<summary>
Do not audit attempts to receive UDP traffic on the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_cmadmin_port" lineno="22922">
<summary>
Send and receive UDP traffic on the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_cmadmin_port" lineno="22939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_cmadmin_port" lineno="22955">
<summary>
Bind TCP sockets to the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_cmadmin_port" lineno="22975">
<summary>
Bind UDP sockets to the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_cmadmin_port" lineno="22995">
<summary>
Do not audit attempts to sbind to cmadmin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_cmadmin_port" lineno="23014">
<summary>
Make a TCP connection to the cmadmin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_cmadmin_port" lineno="23031">
<summary>
Do not audit attempts to make a TCP connection to cmadmin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cmadmin_client_packets" lineno="23051">
<summary>
Send cmadmin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cmadmin_client_packets" lineno="23070">
<summary>
Do not audit attempts to send cmadmin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cmadmin_client_packets" lineno="23089">
<summary>
Receive cmadmin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cmadmin_client_packets" lineno="23108">
<summary>
Do not audit attempts to receive cmadmin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cmadmin_client_packets" lineno="23127">
<summary>
Send and receive cmadmin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cmadmin_client_packets" lineno="23143">
<summary>
Do not audit attempts to send and receive cmadmin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cmadmin_client_packets" lineno="23158">
<summary>
Relabel packets to cmadmin_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cmadmin_server_packets" lineno="23178">
<summary>
Send cmadmin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cmadmin_server_packets" lineno="23197">
<summary>
Do not audit attempts to send cmadmin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cmadmin_server_packets" lineno="23216">
<summary>
Receive cmadmin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cmadmin_server_packets" lineno="23235">
<summary>
Do not audit attempts to receive cmadmin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cmadmin_server_packets" lineno="23254">
<summary>
Send and receive cmadmin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cmadmin_server_packets" lineno="23270">
<summary>
Do not audit attempts to send and receive cmadmin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cmadmin_server_packets" lineno="23285">
<summary>
Relabel packets to cmadmin_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_cobbler_port" lineno="23307">
<summary>
Send and receive TCP traffic on the cobbler port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_cobbler_port" lineno="23326">
<summary>
Send UDP traffic on the cobbler port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_cobbler_port" lineno="23345">
<summary>
Do not audit attempts to send UDP traffic on the cobbler port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_cobbler_port" lineno="23364">
<summary>
Receive UDP traffic on the cobbler port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_cobbler_port" lineno="23383">
<summary>
Do not audit attempts to receive UDP traffic on the cobbler port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_cobbler_port" lineno="23402">
<summary>
Send and receive UDP traffic on the cobbler port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_cobbler_port" lineno="23419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cobbler port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_cobbler_port" lineno="23435">
<summary>
Bind TCP sockets to the cobbler port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_cobbler_port" lineno="23455">
<summary>
Bind UDP sockets to the cobbler port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_cobbler_port" lineno="23475">
<summary>
Do not audit attempts to sbind to cobbler port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_cobbler_port" lineno="23494">
<summary>
Make a TCP connection to the cobbler port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_cobbler_port" lineno="23511">
<summary>
Do not audit attempts to make a TCP connection to cobbler port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cobbler_client_packets" lineno="23531">
<summary>
Send cobbler_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cobbler_client_packets" lineno="23550">
<summary>
Do not audit attempts to send cobbler_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cobbler_client_packets" lineno="23569">
<summary>
Receive cobbler_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cobbler_client_packets" lineno="23588">
<summary>
Do not audit attempts to receive cobbler_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cobbler_client_packets" lineno="23607">
<summary>
Send and receive cobbler_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cobbler_client_packets" lineno="23623">
<summary>
Do not audit attempts to send and receive cobbler_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cobbler_client_packets" lineno="23638">
<summary>
Relabel packets to cobbler_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cobbler_server_packets" lineno="23658">
<summary>
Send cobbler_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cobbler_server_packets" lineno="23677">
<summary>
Do not audit attempts to send cobbler_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cobbler_server_packets" lineno="23696">
<summary>
Receive cobbler_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cobbler_server_packets" lineno="23715">
<summary>
Do not audit attempts to receive cobbler_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cobbler_server_packets" lineno="23734">
<summary>
Send and receive cobbler_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cobbler_server_packets" lineno="23750">
<summary>
Do not audit attempts to send and receive cobbler_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cobbler_server_packets" lineno="23765">
<summary>
Relabel packets to cobbler_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_commplex_link_port" lineno="23787">
<summary>
Send and receive TCP traffic on the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_commplex_link_port" lineno="23806">
<summary>
Send UDP traffic on the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_commplex_link_port" lineno="23825">
<summary>
Do not audit attempts to send UDP traffic on the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_commplex_link_port" lineno="23844">
<summary>
Receive UDP traffic on the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_commplex_link_port" lineno="23863">
<summary>
Do not audit attempts to receive UDP traffic on the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_commplex_link_port" lineno="23882">
<summary>
Send and receive UDP traffic on the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_commplex_link_port" lineno="23899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_commplex_link_port" lineno="23915">
<summary>
Bind TCP sockets to the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_commplex_link_port" lineno="23935">
<summary>
Bind UDP sockets to the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_commplex_link_port" lineno="23955">
<summary>
Do not audit attempts to sbind to commplex_link port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_commplex_link_port" lineno="23974">
<summary>
Make a TCP connection to the commplex_link port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_commplex_link_port" lineno="23991">
<summary>
Do not audit attempts to make a TCP connection to commplex_link port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_commplex_link_client_packets" lineno="24011">
<summary>
Send commplex_link_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_commplex_link_client_packets" lineno="24030">
<summary>
Do not audit attempts to send commplex_link_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_commplex_link_client_packets" lineno="24049">
<summary>
Receive commplex_link_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_commplex_link_client_packets" lineno="24068">
<summary>
Do not audit attempts to receive commplex_link_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_commplex_link_client_packets" lineno="24087">
<summary>
Send and receive commplex_link_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_commplex_link_client_packets" lineno="24103">
<summary>
Do not audit attempts to send and receive commplex_link_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_commplex_link_client_packets" lineno="24118">
<summary>
Relabel packets to commplex_link_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_commplex_link_server_packets" lineno="24138">
<summary>
Send commplex_link_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_commplex_link_server_packets" lineno="24157">
<summary>
Do not audit attempts to send commplex_link_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_commplex_link_server_packets" lineno="24176">
<summary>
Receive commplex_link_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_commplex_link_server_packets" lineno="24195">
<summary>
Do not audit attempts to receive commplex_link_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_commplex_link_server_packets" lineno="24214">
<summary>
Send and receive commplex_link_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_commplex_link_server_packets" lineno="24230">
<summary>
Do not audit attempts to send and receive commplex_link_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_commplex_link_server_packets" lineno="24245">
<summary>
Relabel packets to commplex_link_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_commplex_main_port" lineno="24267">
<summary>
Send and receive TCP traffic on the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_commplex_main_port" lineno="24286">
<summary>
Send UDP traffic on the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_commplex_main_port" lineno="24305">
<summary>
Do not audit attempts to send UDP traffic on the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_commplex_main_port" lineno="24324">
<summary>
Receive UDP traffic on the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_commplex_main_port" lineno="24343">
<summary>
Do not audit attempts to receive UDP traffic on the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_commplex_main_port" lineno="24362">
<summary>
Send and receive UDP traffic on the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_commplex_main_port" lineno="24379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_commplex_main_port" lineno="24395">
<summary>
Bind TCP sockets to the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_commplex_main_port" lineno="24415">
<summary>
Bind UDP sockets to the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_commplex_main_port" lineno="24435">
<summary>
Do not audit attempts to sbind to commplex_main port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_commplex_main_port" lineno="24454">
<summary>
Make a TCP connection to the commplex_main port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_commplex_main_port" lineno="24471">
<summary>
Do not audit attempts to make a TCP connection to commplex_main port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_commplex_main_client_packets" lineno="24491">
<summary>
Send commplex_main_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_commplex_main_client_packets" lineno="24510">
<summary>
Do not audit attempts to send commplex_main_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_commplex_main_client_packets" lineno="24529">
<summary>
Receive commplex_main_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_commplex_main_client_packets" lineno="24548">
<summary>
Do not audit attempts to receive commplex_main_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_commplex_main_client_packets" lineno="24567">
<summary>
Send and receive commplex_main_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_commplex_main_client_packets" lineno="24583">
<summary>
Do not audit attempts to send and receive commplex_main_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_commplex_main_client_packets" lineno="24598">
<summary>
Relabel packets to commplex_main_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_commplex_main_server_packets" lineno="24618">
<summary>
Send commplex_main_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_commplex_main_server_packets" lineno="24637">
<summary>
Do not audit attempts to send commplex_main_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_commplex_main_server_packets" lineno="24656">
<summary>
Receive commplex_main_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_commplex_main_server_packets" lineno="24675">
<summary>
Do not audit attempts to receive commplex_main_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_commplex_main_server_packets" lineno="24694">
<summary>
Send and receive commplex_main_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_commplex_main_server_packets" lineno="24710">
<summary>
Do not audit attempts to send and receive commplex_main_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_commplex_main_server_packets" lineno="24725">
<summary>
Relabel packets to commplex_main_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_comsat_port" lineno="24747">
<summary>
Send and receive TCP traffic on the comsat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_comsat_port" lineno="24766">
<summary>
Send UDP traffic on the comsat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_comsat_port" lineno="24785">
<summary>
Do not audit attempts to send UDP traffic on the comsat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_comsat_port" lineno="24804">
<summary>
Receive UDP traffic on the comsat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_comsat_port" lineno="24823">
<summary>
Do not audit attempts to receive UDP traffic on the comsat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_comsat_port" lineno="24842">
<summary>
Send and receive UDP traffic on the comsat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_comsat_port" lineno="24859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the comsat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_comsat_port" lineno="24875">
<summary>
Bind TCP sockets to the comsat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_comsat_port" lineno="24895">
<summary>
Bind UDP sockets to the comsat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_comsat_port" lineno="24915">
<summary>
Do not audit attempts to sbind to comsat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_comsat_port" lineno="24934">
<summary>
Make a TCP connection to the comsat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_comsat_port" lineno="24951">
<summary>
Do not audit attempts to make a TCP connection to comsat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_comsat_client_packets" lineno="24971">
<summary>
Send comsat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_comsat_client_packets" lineno="24990">
<summary>
Do not audit attempts to send comsat_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_comsat_client_packets" lineno="25009">
<summary>
Receive comsat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_comsat_client_packets" lineno="25028">
<summary>
Do not audit attempts to receive comsat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_comsat_client_packets" lineno="25047">
<summary>
Send and receive comsat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_comsat_client_packets" lineno="25063">
<summary>
Do not audit attempts to send and receive comsat_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_comsat_client_packets" lineno="25078">
<summary>
Relabel packets to comsat_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_comsat_server_packets" lineno="25098">
<summary>
Send comsat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_comsat_server_packets" lineno="25117">
<summary>
Do not audit attempts to send comsat_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_comsat_server_packets" lineno="25136">
<summary>
Receive comsat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_comsat_server_packets" lineno="25155">
<summary>
Do not audit attempts to receive comsat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_comsat_server_packets" lineno="25174">
<summary>
Send and receive comsat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_comsat_server_packets" lineno="25190">
<summary>
Do not audit attempts to send and receive comsat_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_comsat_server_packets" lineno="25205">
<summary>
Relabel packets to comsat_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_condor_port" lineno="25227">
<summary>
Send and receive TCP traffic on the condor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_condor_port" lineno="25246">
<summary>
Send UDP traffic on the condor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_condor_port" lineno="25265">
<summary>
Do not audit attempts to send UDP traffic on the condor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_condor_port" lineno="25284">
<summary>
Receive UDP traffic on the condor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_condor_port" lineno="25303">
<summary>
Do not audit attempts to receive UDP traffic on the condor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_condor_port" lineno="25322">
<summary>
Send and receive UDP traffic on the condor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_condor_port" lineno="25339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the condor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_condor_port" lineno="25355">
<summary>
Bind TCP sockets to the condor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_condor_port" lineno="25375">
<summary>
Bind UDP sockets to the condor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_condor_port" lineno="25395">
<summary>
Do not audit attempts to sbind to condor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_condor_port" lineno="25414">
<summary>
Make a TCP connection to the condor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_condor_port" lineno="25431">
<summary>
Do not audit attempts to make a TCP connection to condor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_condor_client_packets" lineno="25451">
<summary>
Send condor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_condor_client_packets" lineno="25470">
<summary>
Do not audit attempts to send condor_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_condor_client_packets" lineno="25489">
<summary>
Receive condor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_condor_client_packets" lineno="25508">
<summary>
Do not audit attempts to receive condor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_condor_client_packets" lineno="25527">
<summary>
Send and receive condor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_condor_client_packets" lineno="25543">
<summary>
Do not audit attempts to send and receive condor_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_condor_client_packets" lineno="25558">
<summary>
Relabel packets to condor_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_condor_server_packets" lineno="25578">
<summary>
Send condor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_condor_server_packets" lineno="25597">
<summary>
Do not audit attempts to send condor_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_condor_server_packets" lineno="25616">
<summary>
Receive condor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_condor_server_packets" lineno="25635">
<summary>
Do not audit attempts to receive condor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_condor_server_packets" lineno="25654">
<summary>
Send and receive condor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_condor_server_packets" lineno="25670">
<summary>
Do not audit attempts to send and receive condor_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_condor_server_packets" lineno="25685">
<summary>
Relabel packets to condor_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_conman_port" lineno="25707">
<summary>
Send and receive TCP traffic on the conman port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_conman_port" lineno="25726">
<summary>
Send UDP traffic on the conman port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_conman_port" lineno="25745">
<summary>
Do not audit attempts to send UDP traffic on the conman port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_conman_port" lineno="25764">
<summary>
Receive UDP traffic on the conman port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_conman_port" lineno="25783">
<summary>
Do not audit attempts to receive UDP traffic on the conman port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_conman_port" lineno="25802">
<summary>
Send and receive UDP traffic on the conman port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_conman_port" lineno="25819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the conman port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_conman_port" lineno="25835">
<summary>
Bind TCP sockets to the conman port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_conman_port" lineno="25855">
<summary>
Bind UDP sockets to the conman port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_conman_port" lineno="25875">
<summary>
Do not audit attempts to sbind to conman port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_conman_port" lineno="25894">
<summary>
Make a TCP connection to the conman port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_conman_port" lineno="25911">
<summary>
Do not audit attempts to make a TCP connection to conman port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_conman_client_packets" lineno="25931">
<summary>
Send conman_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_conman_client_packets" lineno="25950">
<summary>
Do not audit attempts to send conman_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_conman_client_packets" lineno="25969">
<summary>
Receive conman_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_conman_client_packets" lineno="25988">
<summary>
Do not audit attempts to receive conman_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_conman_client_packets" lineno="26007">
<summary>
Send and receive conman_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_conman_client_packets" lineno="26023">
<summary>
Do not audit attempts to send and receive conman_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_conman_client_packets" lineno="26038">
<summary>
Relabel packets to conman_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_conman_server_packets" lineno="26058">
<summary>
Send conman_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_conman_server_packets" lineno="26077">
<summary>
Do not audit attempts to send conman_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_conman_server_packets" lineno="26096">
<summary>
Receive conman_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_conman_server_packets" lineno="26115">
<summary>
Do not audit attempts to receive conman_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_conman_server_packets" lineno="26134">
<summary>
Send and receive conman_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_conman_server_packets" lineno="26150">
<summary>
Do not audit attempts to send and receive conman_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_conman_server_packets" lineno="26165">
<summary>
Relabel packets to conman_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_connlcli_port" lineno="26187">
<summary>
Send and receive TCP traffic on the connlcli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_connlcli_port" lineno="26206">
<summary>
Send UDP traffic on the connlcli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_connlcli_port" lineno="26225">
<summary>
Do not audit attempts to send UDP traffic on the connlcli port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_connlcli_port" lineno="26244">
<summary>
Receive UDP traffic on the connlcli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_connlcli_port" lineno="26263">
<summary>
Do not audit attempts to receive UDP traffic on the connlcli port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_connlcli_port" lineno="26282">
<summary>
Send and receive UDP traffic on the connlcli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_connlcli_port" lineno="26299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the connlcli port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_connlcli_port" lineno="26315">
<summary>
Bind TCP sockets to the connlcli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_connlcli_port" lineno="26335">
<summary>
Bind UDP sockets to the connlcli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_connlcli_port" lineno="26355">
<summary>
Do not audit attempts to sbind to connlcli port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_connlcli_port" lineno="26374">
<summary>
Make a TCP connection to the connlcli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_connlcli_port" lineno="26391">
<summary>
Do not audit attempts to make a TCP connection to connlcli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_connlcli_client_packets" lineno="26411">
<summary>
Send connlcli_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_connlcli_client_packets" lineno="26430">
<summary>
Do not audit attempts to send connlcli_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_connlcli_client_packets" lineno="26449">
<summary>
Receive connlcli_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_connlcli_client_packets" lineno="26468">
<summary>
Do not audit attempts to receive connlcli_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_connlcli_client_packets" lineno="26487">
<summary>
Send and receive connlcli_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_connlcli_client_packets" lineno="26503">
<summary>
Do not audit attempts to send and receive connlcli_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_connlcli_client_packets" lineno="26518">
<summary>
Relabel packets to connlcli_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_connlcli_server_packets" lineno="26538">
<summary>
Send connlcli_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_connlcli_server_packets" lineno="26557">
<summary>
Do not audit attempts to send connlcli_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_connlcli_server_packets" lineno="26576">
<summary>
Receive connlcli_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_connlcli_server_packets" lineno="26595">
<summary>
Do not audit attempts to receive connlcli_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_connlcli_server_packets" lineno="26614">
<summary>
Send and receive connlcli_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_connlcli_server_packets" lineno="26630">
<summary>
Do not audit attempts to send and receive connlcli_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_connlcli_server_packets" lineno="26645">
<summary>
Relabel packets to connlcli_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_conntrackd_port" lineno="26667">
<summary>
Send and receive TCP traffic on the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_conntrackd_port" lineno="26686">
<summary>
Send UDP traffic on the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_conntrackd_port" lineno="26705">
<summary>
Do not audit attempts to send UDP traffic on the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_conntrackd_port" lineno="26724">
<summary>
Receive UDP traffic on the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_conntrackd_port" lineno="26743">
<summary>
Do not audit attempts to receive UDP traffic on the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_conntrackd_port" lineno="26762">
<summary>
Send and receive UDP traffic on the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_conntrackd_port" lineno="26779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_conntrackd_port" lineno="26795">
<summary>
Bind TCP sockets to the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_conntrackd_port" lineno="26815">
<summary>
Bind UDP sockets to the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_conntrackd_port" lineno="26835">
<summary>
Do not audit attempts to sbind to conntrackd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_conntrackd_port" lineno="26854">
<summary>
Make a TCP connection to the conntrackd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_conntrackd_port" lineno="26871">
<summary>
Do not audit attempts to make a TCP connection to conntrackd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_conntrackd_client_packets" lineno="26891">
<summary>
Send conntrackd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_conntrackd_client_packets" lineno="26910">
<summary>
Do not audit attempts to send conntrackd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_conntrackd_client_packets" lineno="26929">
<summary>
Receive conntrackd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_conntrackd_client_packets" lineno="26948">
<summary>
Do not audit attempts to receive conntrackd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_conntrackd_client_packets" lineno="26967">
<summary>
Send and receive conntrackd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_conntrackd_client_packets" lineno="26983">
<summary>
Do not audit attempts to send and receive conntrackd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_conntrackd_client_packets" lineno="26998">
<summary>
Relabel packets to conntrackd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_conntrackd_server_packets" lineno="27018">
<summary>
Send conntrackd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_conntrackd_server_packets" lineno="27037">
<summary>
Do not audit attempts to send conntrackd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_conntrackd_server_packets" lineno="27056">
<summary>
Receive conntrackd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_conntrackd_server_packets" lineno="27075">
<summary>
Do not audit attempts to receive conntrackd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_conntrackd_server_packets" lineno="27094">
<summary>
Send and receive conntrackd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_conntrackd_server_packets" lineno="27110">
<summary>
Do not audit attempts to send and receive conntrackd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_conntrackd_server_packets" lineno="27125">
<summary>
Relabel packets to conntrackd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_couchdb_port" lineno="27147">
<summary>
Send and receive TCP traffic on the couchdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_couchdb_port" lineno="27166">
<summary>
Send UDP traffic on the couchdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_couchdb_port" lineno="27185">
<summary>
Do not audit attempts to send UDP traffic on the couchdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_couchdb_port" lineno="27204">
<summary>
Receive UDP traffic on the couchdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_couchdb_port" lineno="27223">
<summary>
Do not audit attempts to receive UDP traffic on the couchdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_couchdb_port" lineno="27242">
<summary>
Send and receive UDP traffic on the couchdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_couchdb_port" lineno="27259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the couchdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_couchdb_port" lineno="27275">
<summary>
Bind TCP sockets to the couchdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_couchdb_port" lineno="27295">
<summary>
Bind UDP sockets to the couchdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_couchdb_port" lineno="27315">
<summary>
Do not audit attempts to sbind to couchdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_couchdb_port" lineno="27334">
<summary>
Make a TCP connection to the couchdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_couchdb_port" lineno="27351">
<summary>
Do not audit attempts to make a TCP connection to couchdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_couchdb_client_packets" lineno="27371">
<summary>
Send couchdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_couchdb_client_packets" lineno="27390">
<summary>
Do not audit attempts to send couchdb_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_couchdb_client_packets" lineno="27409">
<summary>
Receive couchdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_couchdb_client_packets" lineno="27428">
<summary>
Do not audit attempts to receive couchdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_couchdb_client_packets" lineno="27447">
<summary>
Send and receive couchdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_couchdb_client_packets" lineno="27463">
<summary>
Do not audit attempts to send and receive couchdb_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_couchdb_client_packets" lineno="27478">
<summary>
Relabel packets to couchdb_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_couchdb_server_packets" lineno="27498">
<summary>
Send couchdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_couchdb_server_packets" lineno="27517">
<summary>
Do not audit attempts to send couchdb_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_couchdb_server_packets" lineno="27536">
<summary>
Receive couchdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_couchdb_server_packets" lineno="27555">
<summary>
Do not audit attempts to receive couchdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_couchdb_server_packets" lineno="27574">
<summary>
Send and receive couchdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_couchdb_server_packets" lineno="27590">
<summary>
Do not audit attempts to send and receive couchdb_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_couchdb_server_packets" lineno="27605">
<summary>
Relabel packets to couchdb_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ctdb_port" lineno="27627">
<summary>
Send and receive TCP traffic on the ctdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ctdb_port" lineno="27646">
<summary>
Send UDP traffic on the ctdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ctdb_port" lineno="27665">
<summary>
Do not audit attempts to send UDP traffic on the ctdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ctdb_port" lineno="27684">
<summary>
Receive UDP traffic on the ctdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ctdb_port" lineno="27703">
<summary>
Do not audit attempts to receive UDP traffic on the ctdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ctdb_port" lineno="27722">
<summary>
Send and receive UDP traffic on the ctdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ctdb_port" lineno="27739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ctdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ctdb_port" lineno="27755">
<summary>
Bind TCP sockets to the ctdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ctdb_port" lineno="27775">
<summary>
Bind UDP sockets to the ctdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ctdb_port" lineno="27795">
<summary>
Do not audit attempts to sbind to ctdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ctdb_port" lineno="27814">
<summary>
Make a TCP connection to the ctdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ctdb_port" lineno="27831">
<summary>
Do not audit attempts to make a TCP connection to ctdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ctdb_client_packets" lineno="27851">
<summary>
Send ctdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ctdb_client_packets" lineno="27870">
<summary>
Do not audit attempts to send ctdb_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ctdb_client_packets" lineno="27889">
<summary>
Receive ctdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ctdb_client_packets" lineno="27908">
<summary>
Do not audit attempts to receive ctdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ctdb_client_packets" lineno="27927">
<summary>
Send and receive ctdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ctdb_client_packets" lineno="27943">
<summary>
Do not audit attempts to send and receive ctdb_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ctdb_client_packets" lineno="27958">
<summary>
Relabel packets to ctdb_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ctdb_server_packets" lineno="27978">
<summary>
Send ctdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ctdb_server_packets" lineno="27997">
<summary>
Do not audit attempts to send ctdb_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ctdb_server_packets" lineno="28016">
<summary>
Receive ctdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ctdb_server_packets" lineno="28035">
<summary>
Do not audit attempts to receive ctdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ctdb_server_packets" lineno="28054">
<summary>
Send and receive ctdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ctdb_server_packets" lineno="28070">
<summary>
Do not audit attempts to send and receive ctdb_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ctdb_server_packets" lineno="28085">
<summary>
Relabel packets to ctdb_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_cvs_port" lineno="28107">
<summary>
Send and receive TCP traffic on the cvs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_cvs_port" lineno="28126">
<summary>
Send UDP traffic on the cvs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_cvs_port" lineno="28145">
<summary>
Do not audit attempts to send UDP traffic on the cvs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_cvs_port" lineno="28164">
<summary>
Receive UDP traffic on the cvs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_cvs_port" lineno="28183">
<summary>
Do not audit attempts to receive UDP traffic on the cvs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_cvs_port" lineno="28202">
<summary>
Send and receive UDP traffic on the cvs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_cvs_port" lineno="28219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cvs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_cvs_port" lineno="28235">
<summary>
Bind TCP sockets to the cvs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_cvs_port" lineno="28255">
<summary>
Bind UDP sockets to the cvs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_cvs_port" lineno="28275">
<summary>
Do not audit attempts to sbind to cvs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_cvs_port" lineno="28294">
<summary>
Make a TCP connection to the cvs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_cvs_port" lineno="28311">
<summary>
Do not audit attempts to make a TCP connection to cvs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cvs_client_packets" lineno="28331">
<summary>
Send cvs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cvs_client_packets" lineno="28350">
<summary>
Do not audit attempts to send cvs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cvs_client_packets" lineno="28369">
<summary>
Receive cvs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cvs_client_packets" lineno="28388">
<summary>
Do not audit attempts to receive cvs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cvs_client_packets" lineno="28407">
<summary>
Send and receive cvs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cvs_client_packets" lineno="28423">
<summary>
Do not audit attempts to send and receive cvs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cvs_client_packets" lineno="28438">
<summary>
Relabel packets to cvs_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cvs_server_packets" lineno="28458">
<summary>
Send cvs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cvs_server_packets" lineno="28477">
<summary>
Do not audit attempts to send cvs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cvs_server_packets" lineno="28496">
<summary>
Receive cvs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cvs_server_packets" lineno="28515">
<summary>
Do not audit attempts to receive cvs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cvs_server_packets" lineno="28534">
<summary>
Send and receive cvs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cvs_server_packets" lineno="28550">
<summary>
Do not audit attempts to send and receive cvs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cvs_server_packets" lineno="28565">
<summary>
Relabel packets to cvs_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_cyphesis_port" lineno="28587">
<summary>
Send and receive TCP traffic on the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_cyphesis_port" lineno="28606">
<summary>
Send UDP traffic on the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_cyphesis_port" lineno="28625">
<summary>
Do not audit attempts to send UDP traffic on the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_cyphesis_port" lineno="28644">
<summary>
Receive UDP traffic on the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_cyphesis_port" lineno="28663">
<summary>
Do not audit attempts to receive UDP traffic on the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_cyphesis_port" lineno="28682">
<summary>
Send and receive UDP traffic on the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_cyphesis_port" lineno="28699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_cyphesis_port" lineno="28715">
<summary>
Bind TCP sockets to the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_cyphesis_port" lineno="28735">
<summary>
Bind UDP sockets to the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_cyphesis_port" lineno="28755">
<summary>
Do not audit attempts to sbind to cyphesis port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_cyphesis_port" lineno="28774">
<summary>
Make a TCP connection to the cyphesis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_cyphesis_port" lineno="28791">
<summary>
Do not audit attempts to make a TCP connection to cyphesis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cyphesis_client_packets" lineno="28811">
<summary>
Send cyphesis_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cyphesis_client_packets" lineno="28830">
<summary>
Do not audit attempts to send cyphesis_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cyphesis_client_packets" lineno="28849">
<summary>
Receive cyphesis_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cyphesis_client_packets" lineno="28868">
<summary>
Do not audit attempts to receive cyphesis_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cyphesis_client_packets" lineno="28887">
<summary>
Send and receive cyphesis_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cyphesis_client_packets" lineno="28903">
<summary>
Do not audit attempts to send and receive cyphesis_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cyphesis_client_packets" lineno="28918">
<summary>
Relabel packets to cyphesis_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cyphesis_server_packets" lineno="28938">
<summary>
Send cyphesis_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cyphesis_server_packets" lineno="28957">
<summary>
Do not audit attempts to send cyphesis_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cyphesis_server_packets" lineno="28976">
<summary>
Receive cyphesis_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cyphesis_server_packets" lineno="28995">
<summary>
Do not audit attempts to receive cyphesis_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cyphesis_server_packets" lineno="29014">
<summary>
Send and receive cyphesis_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cyphesis_server_packets" lineno="29030">
<summary>
Do not audit attempts to send and receive cyphesis_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cyphesis_server_packets" lineno="29045">
<summary>
Relabel packets to cyphesis_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_cyrus_imapd_port" lineno="29067">
<summary>
Send and receive TCP traffic on the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_cyrus_imapd_port" lineno="29086">
<summary>
Send UDP traffic on the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_cyrus_imapd_port" lineno="29105">
<summary>
Do not audit attempts to send UDP traffic on the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_cyrus_imapd_port" lineno="29124">
<summary>
Receive UDP traffic on the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_cyrus_imapd_port" lineno="29143">
<summary>
Do not audit attempts to receive UDP traffic on the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_cyrus_imapd_port" lineno="29162">
<summary>
Send and receive UDP traffic on the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_cyrus_imapd_port" lineno="29179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_cyrus_imapd_port" lineno="29195">
<summary>
Bind TCP sockets to the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_cyrus_imapd_port" lineno="29215">
<summary>
Bind UDP sockets to the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_cyrus_imapd_port" lineno="29235">
<summary>
Do not audit attempts to sbind to cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_cyrus_imapd_port" lineno="29254">
<summary>
Make a TCP connection to the cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_cyrus_imapd_port" lineno="29271">
<summary>
Do not audit attempts to make a TCP connection to cyrus_imapd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cyrus_imapd_client_packets" lineno="29291">
<summary>
Send cyrus_imapd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cyrus_imapd_client_packets" lineno="29310">
<summary>
Do not audit attempts to send cyrus_imapd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cyrus_imapd_client_packets" lineno="29329">
<summary>
Receive cyrus_imapd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cyrus_imapd_client_packets" lineno="29348">
<summary>
Do not audit attempts to receive cyrus_imapd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cyrus_imapd_client_packets" lineno="29367">
<summary>
Send and receive cyrus_imapd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cyrus_imapd_client_packets" lineno="29383">
<summary>
Do not audit attempts to send and receive cyrus_imapd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cyrus_imapd_client_packets" lineno="29398">
<summary>
Relabel packets to cyrus_imapd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_cyrus_imapd_server_packets" lineno="29418">
<summary>
Send cyrus_imapd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_cyrus_imapd_server_packets" lineno="29437">
<summary>
Do not audit attempts to send cyrus_imapd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_cyrus_imapd_server_packets" lineno="29456">
<summary>
Receive cyrus_imapd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_cyrus_imapd_server_packets" lineno="29475">
<summary>
Do not audit attempts to receive cyrus_imapd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_cyrus_imapd_server_packets" lineno="29494">
<summary>
Send and receive cyrus_imapd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_cyrus_imapd_server_packets" lineno="29510">
<summary>
Do not audit attempts to send and receive cyrus_imapd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_cyrus_imapd_server_packets" lineno="29525">
<summary>
Relabel packets to cyrus_imapd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_daap_port" lineno="29547">
<summary>
Send and receive TCP traffic on the daap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_daap_port" lineno="29566">
<summary>
Send UDP traffic on the daap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_daap_port" lineno="29585">
<summary>
Do not audit attempts to send UDP traffic on the daap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_daap_port" lineno="29604">
<summary>
Receive UDP traffic on the daap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_daap_port" lineno="29623">
<summary>
Do not audit attempts to receive UDP traffic on the daap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_daap_port" lineno="29642">
<summary>
Send and receive UDP traffic on the daap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_daap_port" lineno="29659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the daap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_daap_port" lineno="29675">
<summary>
Bind TCP sockets to the daap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_daap_port" lineno="29695">
<summary>
Bind UDP sockets to the daap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_daap_port" lineno="29715">
<summary>
Do not audit attempts to sbind to daap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_daap_port" lineno="29734">
<summary>
Make a TCP connection to the daap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_daap_port" lineno="29751">
<summary>
Do not audit attempts to make a TCP connection to daap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_daap_client_packets" lineno="29771">
<summary>
Send daap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_daap_client_packets" lineno="29790">
<summary>
Do not audit attempts to send daap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_daap_client_packets" lineno="29809">
<summary>
Receive daap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_daap_client_packets" lineno="29828">
<summary>
Do not audit attempts to receive daap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_daap_client_packets" lineno="29847">
<summary>
Send and receive daap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_daap_client_packets" lineno="29863">
<summary>
Do not audit attempts to send and receive daap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_daap_client_packets" lineno="29878">
<summary>
Relabel packets to daap_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_daap_server_packets" lineno="29898">
<summary>
Send daap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_daap_server_packets" lineno="29917">
<summary>
Do not audit attempts to send daap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_daap_server_packets" lineno="29936">
<summary>
Receive daap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_daap_server_packets" lineno="29955">
<summary>
Do not audit attempts to receive daap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_daap_server_packets" lineno="29974">
<summary>
Send and receive daap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_daap_server_packets" lineno="29990">
<summary>
Do not audit attempts to send and receive daap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_daap_server_packets" lineno="30005">
<summary>
Relabel packets to daap_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dbskkd_port" lineno="30027">
<summary>
Send and receive TCP traffic on the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dbskkd_port" lineno="30046">
<summary>
Send UDP traffic on the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dbskkd_port" lineno="30065">
<summary>
Do not audit attempts to send UDP traffic on the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dbskkd_port" lineno="30084">
<summary>
Receive UDP traffic on the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dbskkd_port" lineno="30103">
<summary>
Do not audit attempts to receive UDP traffic on the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dbskkd_port" lineno="30122">
<summary>
Send and receive UDP traffic on the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dbskkd_port" lineno="30139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dbskkd_port" lineno="30155">
<summary>
Bind TCP sockets to the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dbskkd_port" lineno="30175">
<summary>
Bind UDP sockets to the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dbskkd_port" lineno="30195">
<summary>
Do not audit attempts to sbind to dbskkd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dbskkd_port" lineno="30214">
<summary>
Make a TCP connection to the dbskkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dbskkd_port" lineno="30231">
<summary>
Do not audit attempts to make a TCP connection to dbskkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dbskkd_client_packets" lineno="30251">
<summary>
Send dbskkd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dbskkd_client_packets" lineno="30270">
<summary>
Do not audit attempts to send dbskkd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dbskkd_client_packets" lineno="30289">
<summary>
Receive dbskkd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dbskkd_client_packets" lineno="30308">
<summary>
Do not audit attempts to receive dbskkd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dbskkd_client_packets" lineno="30327">
<summary>
Send and receive dbskkd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dbskkd_client_packets" lineno="30343">
<summary>
Do not audit attempts to send and receive dbskkd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dbskkd_client_packets" lineno="30358">
<summary>
Relabel packets to dbskkd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dbskkd_server_packets" lineno="30378">
<summary>
Send dbskkd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dbskkd_server_packets" lineno="30397">
<summary>
Do not audit attempts to send dbskkd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dbskkd_server_packets" lineno="30416">
<summary>
Receive dbskkd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dbskkd_server_packets" lineno="30435">
<summary>
Do not audit attempts to receive dbskkd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dbskkd_server_packets" lineno="30454">
<summary>
Send and receive dbskkd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dbskkd_server_packets" lineno="30470">
<summary>
Do not audit attempts to send and receive dbskkd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dbskkd_server_packets" lineno="30485">
<summary>
Relabel packets to dbskkd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dcc_port" lineno="30507">
<summary>
Send and receive TCP traffic on the dcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dcc_port" lineno="30526">
<summary>
Send UDP traffic on the dcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dcc_port" lineno="30545">
<summary>
Do not audit attempts to send UDP traffic on the dcc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dcc_port" lineno="30564">
<summary>
Receive UDP traffic on the dcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dcc_port" lineno="30583">
<summary>
Do not audit attempts to receive UDP traffic on the dcc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dcc_port" lineno="30602">
<summary>
Send and receive UDP traffic on the dcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dcc_port" lineno="30619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dcc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dcc_port" lineno="30635">
<summary>
Bind TCP sockets to the dcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dcc_port" lineno="30655">
<summary>
Bind UDP sockets to the dcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dcc_port" lineno="30675">
<summary>
Do not audit attempts to sbind to dcc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dcc_port" lineno="30694">
<summary>
Make a TCP connection to the dcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dcc_port" lineno="30711">
<summary>
Do not audit attempts to make a TCP connection to dcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dcc_client_packets" lineno="30731">
<summary>
Send dcc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dcc_client_packets" lineno="30750">
<summary>
Do not audit attempts to send dcc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dcc_client_packets" lineno="30769">
<summary>
Receive dcc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dcc_client_packets" lineno="30788">
<summary>
Do not audit attempts to receive dcc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dcc_client_packets" lineno="30807">
<summary>
Send and receive dcc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dcc_client_packets" lineno="30823">
<summary>
Do not audit attempts to send and receive dcc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dcc_client_packets" lineno="30838">
<summary>
Relabel packets to dcc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dcc_server_packets" lineno="30858">
<summary>
Send dcc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dcc_server_packets" lineno="30877">
<summary>
Do not audit attempts to send dcc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dcc_server_packets" lineno="30896">
<summary>
Receive dcc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dcc_server_packets" lineno="30915">
<summary>
Do not audit attempts to receive dcc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dcc_server_packets" lineno="30934">
<summary>
Send and receive dcc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dcc_server_packets" lineno="30950">
<summary>
Do not audit attempts to send and receive dcc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dcc_server_packets" lineno="30965">
<summary>
Relabel packets to dcc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dccm_port" lineno="30987">
<summary>
Send and receive TCP traffic on the dccm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dccm_port" lineno="31006">
<summary>
Send UDP traffic on the dccm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dccm_port" lineno="31025">
<summary>
Do not audit attempts to send UDP traffic on the dccm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dccm_port" lineno="31044">
<summary>
Receive UDP traffic on the dccm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dccm_port" lineno="31063">
<summary>
Do not audit attempts to receive UDP traffic on the dccm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dccm_port" lineno="31082">
<summary>
Send and receive UDP traffic on the dccm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dccm_port" lineno="31099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dccm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dccm_port" lineno="31115">
<summary>
Bind TCP sockets to the dccm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dccm_port" lineno="31135">
<summary>
Bind UDP sockets to the dccm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dccm_port" lineno="31155">
<summary>
Do not audit attempts to sbind to dccm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dccm_port" lineno="31174">
<summary>
Make a TCP connection to the dccm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dccm_port" lineno="31191">
<summary>
Do not audit attempts to make a TCP connection to dccm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dccm_client_packets" lineno="31211">
<summary>
Send dccm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dccm_client_packets" lineno="31230">
<summary>
Do not audit attempts to send dccm_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dccm_client_packets" lineno="31249">
<summary>
Receive dccm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dccm_client_packets" lineno="31268">
<summary>
Do not audit attempts to receive dccm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dccm_client_packets" lineno="31287">
<summary>
Send and receive dccm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dccm_client_packets" lineno="31303">
<summary>
Do not audit attempts to send and receive dccm_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dccm_client_packets" lineno="31318">
<summary>
Relabel packets to dccm_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dccm_server_packets" lineno="31338">
<summary>
Send dccm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dccm_server_packets" lineno="31357">
<summary>
Do not audit attempts to send dccm_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dccm_server_packets" lineno="31376">
<summary>
Receive dccm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dccm_server_packets" lineno="31395">
<summary>
Do not audit attempts to receive dccm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dccm_server_packets" lineno="31414">
<summary>
Send and receive dccm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dccm_server_packets" lineno="31430">
<summary>
Do not audit attempts to send and receive dccm_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dccm_server_packets" lineno="31445">
<summary>
Relabel packets to dccm_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dey_keyneg_port" lineno="31467">
<summary>
Send and receive TCP traffic on the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dey_keyneg_port" lineno="31486">
<summary>
Send UDP traffic on the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dey_keyneg_port" lineno="31505">
<summary>
Do not audit attempts to send UDP traffic on the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dey_keyneg_port" lineno="31524">
<summary>
Receive UDP traffic on the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dey_keyneg_port" lineno="31543">
<summary>
Do not audit attempts to receive UDP traffic on the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dey_keyneg_port" lineno="31562">
<summary>
Send and receive UDP traffic on the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dey_keyneg_port" lineno="31579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dey_keyneg_port" lineno="31595">
<summary>
Bind TCP sockets to the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dey_keyneg_port" lineno="31615">
<summary>
Bind UDP sockets to the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dey_keyneg_port" lineno="31635">
<summary>
Do not audit attempts to sbind to dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dey_keyneg_port" lineno="31654">
<summary>
Make a TCP connection to the dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dey_keyneg_port" lineno="31671">
<summary>
Do not audit attempts to make a TCP connection to dey_keyneg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dey_keyneg_client_packets" lineno="31691">
<summary>
Send dey_keyneg_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dey_keyneg_client_packets" lineno="31710">
<summary>
Do not audit attempts to send dey_keyneg_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dey_keyneg_client_packets" lineno="31729">
<summary>
Receive dey_keyneg_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dey_keyneg_client_packets" lineno="31748">
<summary>
Do not audit attempts to receive dey_keyneg_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dey_keyneg_client_packets" lineno="31767">
<summary>
Send and receive dey_keyneg_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dey_keyneg_client_packets" lineno="31783">
<summary>
Do not audit attempts to send and receive dey_keyneg_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dey_keyneg_client_packets" lineno="31798">
<summary>
Relabel packets to dey_keyneg_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dey_keyneg_server_packets" lineno="31818">
<summary>
Send dey_keyneg_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dey_keyneg_server_packets" lineno="31837">
<summary>
Do not audit attempts to send dey_keyneg_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dey_keyneg_server_packets" lineno="31856">
<summary>
Receive dey_keyneg_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dey_keyneg_server_packets" lineno="31875">
<summary>
Do not audit attempts to receive dey_keyneg_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dey_keyneg_server_packets" lineno="31894">
<summary>
Send and receive dey_keyneg_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dey_keyneg_server_packets" lineno="31910">
<summary>
Do not audit attempts to send and receive dey_keyneg_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dey_keyneg_server_packets" lineno="31925">
<summary>
Relabel packets to dey_keyneg_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dey_sapi_port" lineno="31947">
<summary>
Send and receive TCP traffic on the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dey_sapi_port" lineno="31966">
<summary>
Send UDP traffic on the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dey_sapi_port" lineno="31985">
<summary>
Do not audit attempts to send UDP traffic on the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dey_sapi_port" lineno="32004">
<summary>
Receive UDP traffic on the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dey_sapi_port" lineno="32023">
<summary>
Do not audit attempts to receive UDP traffic on the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dey_sapi_port" lineno="32042">
<summary>
Send and receive UDP traffic on the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dey_sapi_port" lineno="32059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dey_sapi_port" lineno="32075">
<summary>
Bind TCP sockets to the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dey_sapi_port" lineno="32095">
<summary>
Bind UDP sockets to the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dey_sapi_port" lineno="32115">
<summary>
Do not audit attempts to sbind to dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dey_sapi_port" lineno="32134">
<summary>
Make a TCP connection to the dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dey_sapi_port" lineno="32151">
<summary>
Do not audit attempts to make a TCP connection to dey_sapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dey_sapi_client_packets" lineno="32171">
<summary>
Send dey_sapi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dey_sapi_client_packets" lineno="32190">
<summary>
Do not audit attempts to send dey_sapi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dey_sapi_client_packets" lineno="32209">
<summary>
Receive dey_sapi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dey_sapi_client_packets" lineno="32228">
<summary>
Do not audit attempts to receive dey_sapi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dey_sapi_client_packets" lineno="32247">
<summary>
Send and receive dey_sapi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dey_sapi_client_packets" lineno="32263">
<summary>
Do not audit attempts to send and receive dey_sapi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dey_sapi_client_packets" lineno="32278">
<summary>
Relabel packets to dey_sapi_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dey_sapi_server_packets" lineno="32298">
<summary>
Send dey_sapi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dey_sapi_server_packets" lineno="32317">
<summary>
Do not audit attempts to send dey_sapi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dey_sapi_server_packets" lineno="32336">
<summary>
Receive dey_sapi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dey_sapi_server_packets" lineno="32355">
<summary>
Do not audit attempts to receive dey_sapi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dey_sapi_server_packets" lineno="32374">
<summary>
Send and receive dey_sapi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dey_sapi_server_packets" lineno="32390">
<summary>
Do not audit attempts to send and receive dey_sapi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dey_sapi_server_packets" lineno="32405">
<summary>
Relabel packets to dey_sapi_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dhcpc_port" lineno="32427">
<summary>
Send and receive TCP traffic on the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dhcpc_port" lineno="32446">
<summary>
Send UDP traffic on the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dhcpc_port" lineno="32465">
<summary>
Do not audit attempts to send UDP traffic on the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dhcpc_port" lineno="32484">
<summary>
Receive UDP traffic on the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dhcpc_port" lineno="32503">
<summary>
Do not audit attempts to receive UDP traffic on the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dhcpc_port" lineno="32522">
<summary>
Send and receive UDP traffic on the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dhcpc_port" lineno="32539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dhcpc_port" lineno="32555">
<summary>
Bind TCP sockets to the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dhcpc_port" lineno="32575">
<summary>
Bind UDP sockets to the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dhcpc_port" lineno="32595">
<summary>
Do not audit attempts to sbind to dhcpc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dhcpc_port" lineno="32614">
<summary>
Make a TCP connection to the dhcpc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dhcpc_port" lineno="32631">
<summary>
Do not audit attempts to make a TCP connection to dhcpc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dhcpc_client_packets" lineno="32651">
<summary>
Send dhcpc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dhcpc_client_packets" lineno="32670">
<summary>
Do not audit attempts to send dhcpc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dhcpc_client_packets" lineno="32689">
<summary>
Receive dhcpc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dhcpc_client_packets" lineno="32708">
<summary>
Do not audit attempts to receive dhcpc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dhcpc_client_packets" lineno="32727">
<summary>
Send and receive dhcpc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dhcpc_client_packets" lineno="32743">
<summary>
Do not audit attempts to send and receive dhcpc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dhcpc_client_packets" lineno="32758">
<summary>
Relabel packets to dhcpc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dhcpc_server_packets" lineno="32778">
<summary>
Send dhcpc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dhcpc_server_packets" lineno="32797">
<summary>
Do not audit attempts to send dhcpc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dhcpc_server_packets" lineno="32816">
<summary>
Receive dhcpc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dhcpc_server_packets" lineno="32835">
<summary>
Do not audit attempts to receive dhcpc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dhcpc_server_packets" lineno="32854">
<summary>
Send and receive dhcpc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dhcpc_server_packets" lineno="32870">
<summary>
Do not audit attempts to send and receive dhcpc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dhcpc_server_packets" lineno="32885">
<summary>
Relabel packets to dhcpc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dhcpd_port" lineno="32907">
<summary>
Send and receive TCP traffic on the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dhcpd_port" lineno="32926">
<summary>
Send UDP traffic on the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dhcpd_port" lineno="32945">
<summary>
Do not audit attempts to send UDP traffic on the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dhcpd_port" lineno="32964">
<summary>
Receive UDP traffic on the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dhcpd_port" lineno="32983">
<summary>
Do not audit attempts to receive UDP traffic on the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dhcpd_port" lineno="33002">
<summary>
Send and receive UDP traffic on the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dhcpd_port" lineno="33019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dhcpd_port" lineno="33035">
<summary>
Bind TCP sockets to the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dhcpd_port" lineno="33055">
<summary>
Bind UDP sockets to the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dhcpd_port" lineno="33075">
<summary>
Do not audit attempts to sbind to dhcpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dhcpd_port" lineno="33094">
<summary>
Make a TCP connection to the dhcpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dhcpd_port" lineno="33111">
<summary>
Do not audit attempts to make a TCP connection to dhcpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dhcpd_client_packets" lineno="33131">
<summary>
Send dhcpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dhcpd_client_packets" lineno="33150">
<summary>
Do not audit attempts to send dhcpd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dhcpd_client_packets" lineno="33169">
<summary>
Receive dhcpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dhcpd_client_packets" lineno="33188">
<summary>
Do not audit attempts to receive dhcpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dhcpd_client_packets" lineno="33207">
<summary>
Send and receive dhcpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dhcpd_client_packets" lineno="33223">
<summary>
Do not audit attempts to send and receive dhcpd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dhcpd_client_packets" lineno="33238">
<summary>
Relabel packets to dhcpd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dhcpd_server_packets" lineno="33258">
<summary>
Send dhcpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dhcpd_server_packets" lineno="33277">
<summary>
Do not audit attempts to send dhcpd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dhcpd_server_packets" lineno="33296">
<summary>
Receive dhcpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dhcpd_server_packets" lineno="33315">
<summary>
Do not audit attempts to receive dhcpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dhcpd_server_packets" lineno="33334">
<summary>
Send and receive dhcpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dhcpd_server_packets" lineno="33350">
<summary>
Do not audit attempts to send and receive dhcpd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dhcpd_server_packets" lineno="33365">
<summary>
Relabel packets to dhcpd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dict_port" lineno="33387">
<summary>
Send and receive TCP traffic on the dict port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dict_port" lineno="33406">
<summary>
Send UDP traffic on the dict port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dict_port" lineno="33425">
<summary>
Do not audit attempts to send UDP traffic on the dict port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dict_port" lineno="33444">
<summary>
Receive UDP traffic on the dict port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dict_port" lineno="33463">
<summary>
Do not audit attempts to receive UDP traffic on the dict port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dict_port" lineno="33482">
<summary>
Send and receive UDP traffic on the dict port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dict_port" lineno="33499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dict port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dict_port" lineno="33515">
<summary>
Bind TCP sockets to the dict port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dict_port" lineno="33535">
<summary>
Bind UDP sockets to the dict port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dict_port" lineno="33555">
<summary>
Do not audit attempts to sbind to dict port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dict_port" lineno="33574">
<summary>
Make a TCP connection to the dict port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dict_port" lineno="33591">
<summary>
Do not audit attempts to make a TCP connection to dict port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dict_client_packets" lineno="33611">
<summary>
Send dict_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dict_client_packets" lineno="33630">
<summary>
Do not audit attempts to send dict_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dict_client_packets" lineno="33649">
<summary>
Receive dict_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dict_client_packets" lineno="33668">
<summary>
Do not audit attempts to receive dict_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dict_client_packets" lineno="33687">
<summary>
Send and receive dict_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dict_client_packets" lineno="33703">
<summary>
Do not audit attempts to send and receive dict_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dict_client_packets" lineno="33718">
<summary>
Relabel packets to dict_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dict_server_packets" lineno="33738">
<summary>
Send dict_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dict_server_packets" lineno="33757">
<summary>
Do not audit attempts to send dict_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dict_server_packets" lineno="33776">
<summary>
Receive dict_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dict_server_packets" lineno="33795">
<summary>
Do not audit attempts to receive dict_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dict_server_packets" lineno="33814">
<summary>
Send and receive dict_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dict_server_packets" lineno="33830">
<summary>
Do not audit attempts to send and receive dict_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dict_server_packets" lineno="33845">
<summary>
Relabel packets to dict_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_distccd_port" lineno="33867">
<summary>
Send and receive TCP traffic on the distccd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_distccd_port" lineno="33886">
<summary>
Send UDP traffic on the distccd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_distccd_port" lineno="33905">
<summary>
Do not audit attempts to send UDP traffic on the distccd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_distccd_port" lineno="33924">
<summary>
Receive UDP traffic on the distccd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_distccd_port" lineno="33943">
<summary>
Do not audit attempts to receive UDP traffic on the distccd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_distccd_port" lineno="33962">
<summary>
Send and receive UDP traffic on the distccd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_distccd_port" lineno="33979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the distccd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_distccd_port" lineno="33995">
<summary>
Bind TCP sockets to the distccd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_distccd_port" lineno="34015">
<summary>
Bind UDP sockets to the distccd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_distccd_port" lineno="34035">
<summary>
Do not audit attempts to sbind to distccd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_distccd_port" lineno="34054">
<summary>
Make a TCP connection to the distccd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_distccd_port" lineno="34071">
<summary>
Do not audit attempts to make a TCP connection to distccd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_distccd_client_packets" lineno="34091">
<summary>
Send distccd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_distccd_client_packets" lineno="34110">
<summary>
Do not audit attempts to send distccd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_distccd_client_packets" lineno="34129">
<summary>
Receive distccd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_distccd_client_packets" lineno="34148">
<summary>
Do not audit attempts to receive distccd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_distccd_client_packets" lineno="34167">
<summary>
Send and receive distccd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_distccd_client_packets" lineno="34183">
<summary>
Do not audit attempts to send and receive distccd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_distccd_client_packets" lineno="34198">
<summary>
Relabel packets to distccd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_distccd_server_packets" lineno="34218">
<summary>
Send distccd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_distccd_server_packets" lineno="34237">
<summary>
Do not audit attempts to send distccd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_distccd_server_packets" lineno="34256">
<summary>
Receive distccd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_distccd_server_packets" lineno="34275">
<summary>
Do not audit attempts to receive distccd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_distccd_server_packets" lineno="34294">
<summary>
Send and receive distccd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_distccd_server_packets" lineno="34310">
<summary>
Do not audit attempts to send and receive distccd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_distccd_server_packets" lineno="34325">
<summary>
Relabel packets to distccd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dogtag_port" lineno="34347">
<summary>
Send and receive TCP traffic on the dogtag port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dogtag_port" lineno="34366">
<summary>
Send UDP traffic on the dogtag port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dogtag_port" lineno="34385">
<summary>
Do not audit attempts to send UDP traffic on the dogtag port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dogtag_port" lineno="34404">
<summary>
Receive UDP traffic on the dogtag port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dogtag_port" lineno="34423">
<summary>
Do not audit attempts to receive UDP traffic on the dogtag port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dogtag_port" lineno="34442">
<summary>
Send and receive UDP traffic on the dogtag port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dogtag_port" lineno="34459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dogtag port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dogtag_port" lineno="34475">
<summary>
Bind TCP sockets to the dogtag port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dogtag_port" lineno="34495">
<summary>
Bind UDP sockets to the dogtag port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dogtag_port" lineno="34515">
<summary>
Do not audit attempts to sbind to dogtag port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dogtag_port" lineno="34534">
<summary>
Make a TCP connection to the dogtag port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dogtag_port" lineno="34551">
<summary>
Do not audit attempts to make a TCP connection to dogtag port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dogtag_client_packets" lineno="34571">
<summary>
Send dogtag_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dogtag_client_packets" lineno="34590">
<summary>
Do not audit attempts to send dogtag_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dogtag_client_packets" lineno="34609">
<summary>
Receive dogtag_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dogtag_client_packets" lineno="34628">
<summary>
Do not audit attempts to receive dogtag_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dogtag_client_packets" lineno="34647">
<summary>
Send and receive dogtag_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dogtag_client_packets" lineno="34663">
<summary>
Do not audit attempts to send and receive dogtag_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dogtag_client_packets" lineno="34678">
<summary>
Relabel packets to dogtag_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dogtag_server_packets" lineno="34698">
<summary>
Send dogtag_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dogtag_server_packets" lineno="34717">
<summary>
Do not audit attempts to send dogtag_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dogtag_server_packets" lineno="34736">
<summary>
Receive dogtag_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dogtag_server_packets" lineno="34755">
<summary>
Do not audit attempts to receive dogtag_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dogtag_server_packets" lineno="34774">
<summary>
Send and receive dogtag_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dogtag_server_packets" lineno="34790">
<summary>
Do not audit attempts to send and receive dogtag_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dogtag_server_packets" lineno="34805">
<summary>
Relabel packets to dogtag_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dns_port" lineno="34827">
<summary>
Send and receive TCP traffic on the dns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dns_port" lineno="34846">
<summary>
Send UDP traffic on the dns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dns_port" lineno="34865">
<summary>
Do not audit attempts to send UDP traffic on the dns port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dns_port" lineno="34884">
<summary>
Receive UDP traffic on the dns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dns_port" lineno="34903">
<summary>
Do not audit attempts to receive UDP traffic on the dns port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dns_port" lineno="34922">
<summary>
Send and receive UDP traffic on the dns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dns_port" lineno="34939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dns port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dns_port" lineno="34955">
<summary>
Bind TCP sockets to the dns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dns_port" lineno="34975">
<summary>
Bind UDP sockets to the dns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dns_port" lineno="34995">
<summary>
Do not audit attempts to sbind to dns port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dns_port" lineno="35014">
<summary>
Make a TCP connection to the dns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dns_port" lineno="35031">
<summary>
Do not audit attempts to make a TCP connection to dns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dns_client_packets" lineno="35051">
<summary>
Send dns_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dns_client_packets" lineno="35070">
<summary>
Do not audit attempts to send dns_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dns_client_packets" lineno="35089">
<summary>
Receive dns_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dns_client_packets" lineno="35108">
<summary>
Do not audit attempts to receive dns_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dns_client_packets" lineno="35127">
<summary>
Send and receive dns_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dns_client_packets" lineno="35143">
<summary>
Do not audit attempts to send and receive dns_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dns_client_packets" lineno="35158">
<summary>
Relabel packets to dns_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dns_server_packets" lineno="35178">
<summary>
Send dns_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dns_server_packets" lineno="35197">
<summary>
Do not audit attempts to send dns_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dns_server_packets" lineno="35216">
<summary>
Receive dns_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dns_server_packets" lineno="35235">
<summary>
Do not audit attempts to receive dns_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dns_server_packets" lineno="35254">
<summary>
Send and receive dns_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dns_server_packets" lineno="35270">
<summary>
Do not audit attempts to send and receive dns_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dns_server_packets" lineno="35285">
<summary>
Relabel packets to dns_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_dnssec_port" lineno="35307">
<summary>
Send and receive TCP traffic on the dnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_dnssec_port" lineno="35326">
<summary>
Send UDP traffic on the dnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_dnssec_port" lineno="35345">
<summary>
Do not audit attempts to send UDP traffic on the dnssec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_dnssec_port" lineno="35364">
<summary>
Receive UDP traffic on the dnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_dnssec_port" lineno="35383">
<summary>
Do not audit attempts to receive UDP traffic on the dnssec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_dnssec_port" lineno="35402">
<summary>
Send and receive UDP traffic on the dnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_dnssec_port" lineno="35419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the dnssec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_dnssec_port" lineno="35435">
<summary>
Bind TCP sockets to the dnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_dnssec_port" lineno="35455">
<summary>
Bind UDP sockets to the dnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_dnssec_port" lineno="35475">
<summary>
Do not audit attempts to sbind to dnssec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_dnssec_port" lineno="35494">
<summary>
Make a TCP connection to the dnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_dnssec_port" lineno="35511">
<summary>
Do not audit attempts to make a TCP connection to dnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dnssec_client_packets" lineno="35531">
<summary>
Send dnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dnssec_client_packets" lineno="35550">
<summary>
Do not audit attempts to send dnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dnssec_client_packets" lineno="35569">
<summary>
Receive dnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dnssec_client_packets" lineno="35588">
<summary>
Do not audit attempts to receive dnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dnssec_client_packets" lineno="35607">
<summary>
Send and receive dnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dnssec_client_packets" lineno="35623">
<summary>
Do not audit attempts to send and receive dnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dnssec_client_packets" lineno="35638">
<summary>
Relabel packets to dnssec_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_dnssec_server_packets" lineno="35658">
<summary>
Send dnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_dnssec_server_packets" lineno="35677">
<summary>
Do not audit attempts to send dnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_dnssec_server_packets" lineno="35696">
<summary>
Receive dnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_dnssec_server_packets" lineno="35715">
<summary>
Do not audit attempts to receive dnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_dnssec_server_packets" lineno="35734">
<summary>
Send and receive dnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_dnssec_server_packets" lineno="35750">
<summary>
Do not audit attempts to send and receive dnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_dnssec_server_packets" lineno="35765">
<summary>
Relabel packets to dnssec_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_echo_port" lineno="35787">
<summary>
Send and receive TCP traffic on the echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_echo_port" lineno="35806">
<summary>
Send UDP traffic on the echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_echo_port" lineno="35825">
<summary>
Do not audit attempts to send UDP traffic on the echo port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_echo_port" lineno="35844">
<summary>
Receive UDP traffic on the echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_echo_port" lineno="35863">
<summary>
Do not audit attempts to receive UDP traffic on the echo port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_echo_port" lineno="35882">
<summary>
Send and receive UDP traffic on the echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_echo_port" lineno="35899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the echo port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_echo_port" lineno="35915">
<summary>
Bind TCP sockets to the echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_echo_port" lineno="35935">
<summary>
Bind UDP sockets to the echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_echo_port" lineno="35955">
<summary>
Do not audit attempts to sbind to echo port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_echo_port" lineno="35974">
<summary>
Make a TCP connection to the echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_echo_port" lineno="35991">
<summary>
Do not audit attempts to make a TCP connection to echo port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_echo_client_packets" lineno="36011">
<summary>
Send echo_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_echo_client_packets" lineno="36030">
<summary>
Do not audit attempts to send echo_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_echo_client_packets" lineno="36049">
<summary>
Receive echo_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_echo_client_packets" lineno="36068">
<summary>
Do not audit attempts to receive echo_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_echo_client_packets" lineno="36087">
<summary>
Send and receive echo_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_echo_client_packets" lineno="36103">
<summary>
Do not audit attempts to send and receive echo_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_echo_client_packets" lineno="36118">
<summary>
Relabel packets to echo_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_echo_server_packets" lineno="36138">
<summary>
Send echo_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_echo_server_packets" lineno="36157">
<summary>
Do not audit attempts to send echo_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_echo_server_packets" lineno="36176">
<summary>
Receive echo_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_echo_server_packets" lineno="36195">
<summary>
Do not audit attempts to receive echo_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_echo_server_packets" lineno="36214">
<summary>
Send and receive echo_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_echo_server_packets" lineno="36230">
<summary>
Do not audit attempts to send and receive echo_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_echo_server_packets" lineno="36245">
<summary>
Relabel packets to echo_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_efs_port" lineno="36267">
<summary>
Send and receive TCP traffic on the efs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_efs_port" lineno="36286">
<summary>
Send UDP traffic on the efs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_efs_port" lineno="36305">
<summary>
Do not audit attempts to send UDP traffic on the efs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_efs_port" lineno="36324">
<summary>
Receive UDP traffic on the efs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_efs_port" lineno="36343">
<summary>
Do not audit attempts to receive UDP traffic on the efs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_efs_port" lineno="36362">
<summary>
Send and receive UDP traffic on the efs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_efs_port" lineno="36379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the efs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_efs_port" lineno="36395">
<summary>
Bind TCP sockets to the efs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_efs_port" lineno="36415">
<summary>
Bind UDP sockets to the efs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_efs_port" lineno="36435">
<summary>
Do not audit attempts to sbind to efs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_efs_port" lineno="36454">
<summary>
Make a TCP connection to the efs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_efs_port" lineno="36471">
<summary>
Do not audit attempts to make a TCP connection to efs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_efs_client_packets" lineno="36491">
<summary>
Send efs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_efs_client_packets" lineno="36510">
<summary>
Do not audit attempts to send efs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_efs_client_packets" lineno="36529">
<summary>
Receive efs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_efs_client_packets" lineno="36548">
<summary>
Do not audit attempts to receive efs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_efs_client_packets" lineno="36567">
<summary>
Send and receive efs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_efs_client_packets" lineno="36583">
<summary>
Do not audit attempts to send and receive efs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_efs_client_packets" lineno="36598">
<summary>
Relabel packets to efs_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_efs_server_packets" lineno="36618">
<summary>
Send efs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_efs_server_packets" lineno="36637">
<summary>
Do not audit attempts to send efs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_efs_server_packets" lineno="36656">
<summary>
Receive efs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_efs_server_packets" lineno="36675">
<summary>
Do not audit attempts to receive efs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_efs_server_packets" lineno="36694">
<summary>
Send and receive efs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_efs_server_packets" lineno="36710">
<summary>
Do not audit attempts to send and receive efs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_efs_server_packets" lineno="36725">
<summary>
Relabel packets to efs_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_embrace_dp_c_port" lineno="36747">
<summary>
Send and receive TCP traffic on the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_embrace_dp_c_port" lineno="36766">
<summary>
Send UDP traffic on the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_embrace_dp_c_port" lineno="36785">
<summary>
Do not audit attempts to send UDP traffic on the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_embrace_dp_c_port" lineno="36804">
<summary>
Receive UDP traffic on the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_embrace_dp_c_port" lineno="36823">
<summary>
Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_embrace_dp_c_port" lineno="36842">
<summary>
Send and receive UDP traffic on the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_embrace_dp_c_port" lineno="36859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_embrace_dp_c_port" lineno="36875">
<summary>
Bind TCP sockets to the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_embrace_dp_c_port" lineno="36895">
<summary>
Bind UDP sockets to the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_embrace_dp_c_port" lineno="36915">
<summary>
Do not audit attempts to sbind to embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_embrace_dp_c_port" lineno="36934">
<summary>
Make a TCP connection to the embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_embrace_dp_c_port" lineno="36951">
<summary>
Do not audit attempts to make a TCP connection to embrace_dp_c port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_embrace_dp_c_client_packets" lineno="36971">
<summary>
Send embrace_dp_c_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_embrace_dp_c_client_packets" lineno="36990">
<summary>
Do not audit attempts to send embrace_dp_c_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_embrace_dp_c_client_packets" lineno="37009">
<summary>
Receive embrace_dp_c_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_embrace_dp_c_client_packets" lineno="37028">
<summary>
Do not audit attempts to receive embrace_dp_c_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_embrace_dp_c_client_packets" lineno="37047">
<summary>
Send and receive embrace_dp_c_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_client_packets" lineno="37063">
<summary>
Do not audit attempts to send and receive embrace_dp_c_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_embrace_dp_c_client_packets" lineno="37078">
<summary>
Relabel packets to embrace_dp_c_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_embrace_dp_c_server_packets" lineno="37098">
<summary>
Send embrace_dp_c_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_embrace_dp_c_server_packets" lineno="37117">
<summary>
Do not audit attempts to send embrace_dp_c_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_embrace_dp_c_server_packets" lineno="37136">
<summary>
Receive embrace_dp_c_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_embrace_dp_c_server_packets" lineno="37155">
<summary>
Do not audit attempts to receive embrace_dp_c_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_embrace_dp_c_server_packets" lineno="37174">
<summary>
Send and receive embrace_dp_c_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_embrace_dp_c_server_packets" lineno="37190">
<summary>
Do not audit attempts to send and receive embrace_dp_c_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_embrace_dp_c_server_packets" lineno="37205">
<summary>
Relabel packets to embrace_dp_c_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_epmap_port" lineno="37227">
<summary>
Send and receive TCP traffic on the epmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_epmap_port" lineno="37246">
<summary>
Send UDP traffic on the epmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_epmap_port" lineno="37265">
<summary>
Do not audit attempts to send UDP traffic on the epmap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_epmap_port" lineno="37284">
<summary>
Receive UDP traffic on the epmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_epmap_port" lineno="37303">
<summary>
Do not audit attempts to receive UDP traffic on the epmap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_epmap_port" lineno="37322">
<summary>
Send and receive UDP traffic on the epmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_epmap_port" lineno="37339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the epmap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_epmap_port" lineno="37355">
<summary>
Bind TCP sockets to the epmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_epmap_port" lineno="37375">
<summary>
Bind UDP sockets to the epmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_epmap_port" lineno="37395">
<summary>
Do not audit attempts to sbind to epmap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_epmap_port" lineno="37414">
<summary>
Make a TCP connection to the epmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_epmap_port" lineno="37431">
<summary>
Do not audit attempts to make a TCP connection to epmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_epmap_client_packets" lineno="37451">
<summary>
Send epmap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_epmap_client_packets" lineno="37470">
<summary>
Do not audit attempts to send epmap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_epmap_client_packets" lineno="37489">
<summary>
Receive epmap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_epmap_client_packets" lineno="37508">
<summary>
Do not audit attempts to receive epmap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_epmap_client_packets" lineno="37527">
<summary>
Send and receive epmap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_epmap_client_packets" lineno="37543">
<summary>
Do not audit attempts to send and receive epmap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_epmap_client_packets" lineno="37558">
<summary>
Relabel packets to epmap_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_epmap_server_packets" lineno="37578">
<summary>
Send epmap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_epmap_server_packets" lineno="37597">
<summary>
Do not audit attempts to send epmap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_epmap_server_packets" lineno="37616">
<summary>
Receive epmap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_epmap_server_packets" lineno="37635">
<summary>
Do not audit attempts to receive epmap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_epmap_server_packets" lineno="37654">
<summary>
Send and receive epmap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_epmap_server_packets" lineno="37670">
<summary>
Do not audit attempts to send and receive epmap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_epmap_server_packets" lineno="37685">
<summary>
Relabel packets to epmap_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_epmd_port" lineno="37707">
<summary>
Send and receive TCP traffic on the epmd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_epmd_port" lineno="37726">
<summary>
Send UDP traffic on the epmd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_epmd_port" lineno="37745">
<summary>
Do not audit attempts to send UDP traffic on the epmd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_epmd_port" lineno="37764">
<summary>
Receive UDP traffic on the epmd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_epmd_port" lineno="37783">
<summary>
Do not audit attempts to receive UDP traffic on the epmd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_epmd_port" lineno="37802">
<summary>
Send and receive UDP traffic on the epmd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_epmd_port" lineno="37819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the epmd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_epmd_port" lineno="37835">
<summary>
Bind TCP sockets to the epmd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_epmd_port" lineno="37855">
<summary>
Bind UDP sockets to the epmd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_epmd_port" lineno="37875">
<summary>
Do not audit attempts to sbind to epmd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_epmd_port" lineno="37894">
<summary>
Make a TCP connection to the epmd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_epmd_port" lineno="37911">
<summary>
Do not audit attempts to make a TCP connection to epmd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_epmd_client_packets" lineno="37931">
<summary>
Send epmd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_epmd_client_packets" lineno="37950">
<summary>
Do not audit attempts to send epmd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_epmd_client_packets" lineno="37969">
<summary>
Receive epmd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_epmd_client_packets" lineno="37988">
<summary>
Do not audit attempts to receive epmd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_epmd_client_packets" lineno="38007">
<summary>
Send and receive epmd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_epmd_client_packets" lineno="38023">
<summary>
Do not audit attempts to send and receive epmd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_epmd_client_packets" lineno="38038">
<summary>
Relabel packets to epmd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_epmd_server_packets" lineno="38058">
<summary>
Send epmd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_epmd_server_packets" lineno="38077">
<summary>
Do not audit attempts to send epmd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_epmd_server_packets" lineno="38096">
<summary>
Receive epmd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_epmd_server_packets" lineno="38115">
<summary>
Do not audit attempts to receive epmd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_epmd_server_packets" lineno="38134">
<summary>
Send and receive epmd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_epmd_server_packets" lineno="38150">
<summary>
Do not audit attempts to send and receive epmd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_epmd_server_packets" lineno="38165">
<summary>
Relabel packets to epmd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_fac_restore_port" lineno="38187">
<summary>
Send and receive TCP traffic on the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_fac_restore_port" lineno="38206">
<summary>
Send UDP traffic on the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_fac_restore_port" lineno="38225">
<summary>
Do not audit attempts to send UDP traffic on the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_fac_restore_port" lineno="38244">
<summary>
Receive UDP traffic on the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_fac_restore_port" lineno="38263">
<summary>
Do not audit attempts to receive UDP traffic on the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_fac_restore_port" lineno="38282">
<summary>
Send and receive UDP traffic on the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_fac_restore_port" lineno="38299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_fac_restore_port" lineno="38315">
<summary>
Bind TCP sockets to the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_fac_restore_port" lineno="38335">
<summary>
Bind UDP sockets to the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_fac_restore_port" lineno="38355">
<summary>
Do not audit attempts to sbind to fac_restore port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_fac_restore_port" lineno="38374">
<summary>
Make a TCP connection to the fac_restore port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_fac_restore_port" lineno="38391">
<summary>
Do not audit attempts to make a TCP connection to fac_restore port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_fac_restore_client_packets" lineno="38411">
<summary>
Send fac_restore_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_fac_restore_client_packets" lineno="38430">
<summary>
Do not audit attempts to send fac_restore_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_fac_restore_client_packets" lineno="38449">
<summary>
Receive fac_restore_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_fac_restore_client_packets" lineno="38468">
<summary>
Do not audit attempts to receive fac_restore_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_fac_restore_client_packets" lineno="38487">
<summary>
Send and receive fac_restore_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_fac_restore_client_packets" lineno="38503">
<summary>
Do not audit attempts to send and receive fac_restore_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_fac_restore_client_packets" lineno="38518">
<summary>
Relabel packets to fac_restore_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_fac_restore_server_packets" lineno="38538">
<summary>
Send fac_restore_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_fac_restore_server_packets" lineno="38557">
<summary>
Do not audit attempts to send fac_restore_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_fac_restore_server_packets" lineno="38576">
<summary>
Receive fac_restore_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_fac_restore_server_packets" lineno="38595">
<summary>
Do not audit attempts to receive fac_restore_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_fac_restore_server_packets" lineno="38614">
<summary>
Send and receive fac_restore_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_fac_restore_server_packets" lineno="38630">
<summary>
Do not audit attempts to send and receive fac_restore_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_fac_restore_server_packets" lineno="38645">
<summary>
Relabel packets to fac_restore_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_fingerd_port" lineno="38667">
<summary>
Send and receive TCP traffic on the fingerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_fingerd_port" lineno="38686">
<summary>
Send UDP traffic on the fingerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_fingerd_port" lineno="38705">
<summary>
Do not audit attempts to send UDP traffic on the fingerd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_fingerd_port" lineno="38724">
<summary>
Receive UDP traffic on the fingerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_fingerd_port" lineno="38743">
<summary>
Do not audit attempts to receive UDP traffic on the fingerd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_fingerd_port" lineno="38762">
<summary>
Send and receive UDP traffic on the fingerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_fingerd_port" lineno="38779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the fingerd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_fingerd_port" lineno="38795">
<summary>
Bind TCP sockets to the fingerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_fingerd_port" lineno="38815">
<summary>
Bind UDP sockets to the fingerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_fingerd_port" lineno="38835">
<summary>
Do not audit attempts to sbind to fingerd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_fingerd_port" lineno="38854">
<summary>
Make a TCP connection to the fingerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_fingerd_port" lineno="38871">
<summary>
Do not audit attempts to make a TCP connection to fingerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_fingerd_client_packets" lineno="38891">
<summary>
Send fingerd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_fingerd_client_packets" lineno="38910">
<summary>
Do not audit attempts to send fingerd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_fingerd_client_packets" lineno="38929">
<summary>
Receive fingerd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_fingerd_client_packets" lineno="38948">
<summary>
Do not audit attempts to receive fingerd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_fingerd_client_packets" lineno="38967">
<summary>
Send and receive fingerd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_fingerd_client_packets" lineno="38983">
<summary>
Do not audit attempts to send and receive fingerd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_fingerd_client_packets" lineno="38998">
<summary>
Relabel packets to fingerd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_fingerd_server_packets" lineno="39018">
<summary>
Send fingerd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_fingerd_server_packets" lineno="39037">
<summary>
Do not audit attempts to send fingerd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_fingerd_server_packets" lineno="39056">
<summary>
Receive fingerd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_fingerd_server_packets" lineno="39075">
<summary>
Do not audit attempts to receive fingerd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_fingerd_server_packets" lineno="39094">
<summary>
Send and receive fingerd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_fingerd_server_packets" lineno="39110">
<summary>
Do not audit attempts to send and receive fingerd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_fingerd_server_packets" lineno="39125">
<summary>
Relabel packets to fingerd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_firepower_port" lineno="39147">
<summary>
Send and receive TCP traffic on the firepower port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_firepower_port" lineno="39166">
<summary>
Send UDP traffic on the firepower port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_firepower_port" lineno="39185">
<summary>
Do not audit attempts to send UDP traffic on the firepower port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_firepower_port" lineno="39204">
<summary>
Receive UDP traffic on the firepower port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_firepower_port" lineno="39223">
<summary>
Do not audit attempts to receive UDP traffic on the firepower port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_firepower_port" lineno="39242">
<summary>
Send and receive UDP traffic on the firepower port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_firepower_port" lineno="39259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the firepower port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_firepower_port" lineno="39275">
<summary>
Bind TCP sockets to the firepower port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_firepower_port" lineno="39295">
<summary>
Bind UDP sockets to the firepower port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_firepower_port" lineno="39315">
<summary>
Do not audit attempts to sbind to firepower port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_firepower_port" lineno="39334">
<summary>
Make a TCP connection to the firepower port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_firepower_port" lineno="39351">
<summary>
Do not audit attempts to make a TCP connection to firepower port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_firepower_client_packets" lineno="39371">
<summary>
Send firepower_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_firepower_client_packets" lineno="39390">
<summary>
Do not audit attempts to send firepower_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_firepower_client_packets" lineno="39409">
<summary>
Receive firepower_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_firepower_client_packets" lineno="39428">
<summary>
Do not audit attempts to receive firepower_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_firepower_client_packets" lineno="39447">
<summary>
Send and receive firepower_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_firepower_client_packets" lineno="39463">
<summary>
Do not audit attempts to send and receive firepower_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_firepower_client_packets" lineno="39478">
<summary>
Relabel packets to firepower_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_firepower_server_packets" lineno="39498">
<summary>
Send firepower_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_firepower_server_packets" lineno="39517">
<summary>
Do not audit attempts to send firepower_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_firepower_server_packets" lineno="39536">
<summary>
Receive firepower_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_firepower_server_packets" lineno="39555">
<summary>
Do not audit attempts to receive firepower_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_firepower_server_packets" lineno="39574">
<summary>
Send and receive firepower_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_firepower_server_packets" lineno="39590">
<summary>
Do not audit attempts to send and receive firepower_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_firepower_server_packets" lineno="39605">
<summary>
Relabel packets to firepower_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_fmpro_internal_port" lineno="39627">
<summary>
Send and receive TCP traffic on the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_fmpro_internal_port" lineno="39646">
<summary>
Send UDP traffic on the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_fmpro_internal_port" lineno="39665">
<summary>
Do not audit attempts to send UDP traffic on the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_fmpro_internal_port" lineno="39684">
<summary>
Receive UDP traffic on the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_fmpro_internal_port" lineno="39703">
<summary>
Do not audit attempts to receive UDP traffic on the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_fmpro_internal_port" lineno="39722">
<summary>
Send and receive UDP traffic on the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_fmpro_internal_port" lineno="39739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_fmpro_internal_port" lineno="39755">
<summary>
Bind TCP sockets to the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_fmpro_internal_port" lineno="39775">
<summary>
Bind UDP sockets to the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_fmpro_internal_port" lineno="39795">
<summary>
Do not audit attempts to sbind to fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_fmpro_internal_port" lineno="39814">
<summary>
Make a TCP connection to the fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_fmpro_internal_port" lineno="39831">
<summary>
Do not audit attempts to make a TCP connection to fmpro_internal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_fmpro_internal_client_packets" lineno="39851">
<summary>
Send fmpro_internal_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_fmpro_internal_client_packets" lineno="39870">
<summary>
Do not audit attempts to send fmpro_internal_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_fmpro_internal_client_packets" lineno="39889">
<summary>
Receive fmpro_internal_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_fmpro_internal_client_packets" lineno="39908">
<summary>
Do not audit attempts to receive fmpro_internal_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_fmpro_internal_client_packets" lineno="39927">
<summary>
Send and receive fmpro_internal_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_fmpro_internal_client_packets" lineno="39943">
<summary>
Do not audit attempts to send and receive fmpro_internal_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_fmpro_internal_client_packets" lineno="39958">
<summary>
Relabel packets to fmpro_internal_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_fmpro_internal_server_packets" lineno="39978">
<summary>
Send fmpro_internal_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_fmpro_internal_server_packets" lineno="39997">
<summary>
Do not audit attempts to send fmpro_internal_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_fmpro_internal_server_packets" lineno="40016">
<summary>
Receive fmpro_internal_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_fmpro_internal_server_packets" lineno="40035">
<summary>
Do not audit attempts to receive fmpro_internal_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_fmpro_internal_server_packets" lineno="40054">
<summary>
Send and receive fmpro_internal_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_fmpro_internal_server_packets" lineno="40070">
<summary>
Do not audit attempts to send and receive fmpro_internal_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_fmpro_internal_server_packets" lineno="40085">
<summary>
Relabel packets to fmpro_internal_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_flash_port" lineno="40107">
<summary>
Send and receive TCP traffic on the flash port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_flash_port" lineno="40126">
<summary>
Send UDP traffic on the flash port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_flash_port" lineno="40145">
<summary>
Do not audit attempts to send UDP traffic on the flash port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_flash_port" lineno="40164">
<summary>
Receive UDP traffic on the flash port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_flash_port" lineno="40183">
<summary>
Do not audit attempts to receive UDP traffic on the flash port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_flash_port" lineno="40202">
<summary>
Send and receive UDP traffic on the flash port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_flash_port" lineno="40219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the flash port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_flash_port" lineno="40235">
<summary>
Bind TCP sockets to the flash port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_flash_port" lineno="40255">
<summary>
Bind UDP sockets to the flash port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_flash_port" lineno="40275">
<summary>
Do not audit attempts to sbind to flash port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_flash_port" lineno="40294">
<summary>
Make a TCP connection to the flash port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_flash_port" lineno="40311">
<summary>
Do not audit attempts to make a TCP connection to flash port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_flash_client_packets" lineno="40331">
<summary>
Send flash_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_flash_client_packets" lineno="40350">
<summary>
Do not audit attempts to send flash_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_flash_client_packets" lineno="40369">
<summary>
Receive flash_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_flash_client_packets" lineno="40388">
<summary>
Do not audit attempts to receive flash_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_flash_client_packets" lineno="40407">
<summary>
Send and receive flash_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_flash_client_packets" lineno="40423">
<summary>
Do not audit attempts to send and receive flash_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_flash_client_packets" lineno="40438">
<summary>
Relabel packets to flash_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_flash_server_packets" lineno="40458">
<summary>
Send flash_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_flash_server_packets" lineno="40477">
<summary>
Do not audit attempts to send flash_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_flash_server_packets" lineno="40496">
<summary>
Receive flash_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_flash_server_packets" lineno="40515">
<summary>
Do not audit attempts to receive flash_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_flash_server_packets" lineno="40534">
<summary>
Send and receive flash_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_flash_server_packets" lineno="40550">
<summary>
Do not audit attempts to send and receive flash_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_flash_server_packets" lineno="40565">
<summary>
Relabel packets to flash_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_freeipmi_port" lineno="40587">
<summary>
Send and receive TCP traffic on the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_freeipmi_port" lineno="40606">
<summary>
Send UDP traffic on the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_freeipmi_port" lineno="40625">
<summary>
Do not audit attempts to send UDP traffic on the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_freeipmi_port" lineno="40644">
<summary>
Receive UDP traffic on the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_freeipmi_port" lineno="40663">
<summary>
Do not audit attempts to receive UDP traffic on the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_freeipmi_port" lineno="40682">
<summary>
Send and receive UDP traffic on the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_freeipmi_port" lineno="40699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_freeipmi_port" lineno="40715">
<summary>
Bind TCP sockets to the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_freeipmi_port" lineno="40735">
<summary>
Bind UDP sockets to the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_freeipmi_port" lineno="40755">
<summary>
Do not audit attempts to sbind to freeipmi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_freeipmi_port" lineno="40774">
<summary>
Make a TCP connection to the freeipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_freeipmi_port" lineno="40791">
<summary>
Do not audit attempts to make a TCP connection to freeipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_freeipmi_client_packets" lineno="40811">
<summary>
Send freeipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_freeipmi_client_packets" lineno="40830">
<summary>
Do not audit attempts to send freeipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_freeipmi_client_packets" lineno="40849">
<summary>
Receive freeipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_freeipmi_client_packets" lineno="40868">
<summary>
Do not audit attempts to receive freeipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_freeipmi_client_packets" lineno="40887">
<summary>
Send and receive freeipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_freeipmi_client_packets" lineno="40903">
<summary>
Do not audit attempts to send and receive freeipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_freeipmi_client_packets" lineno="40918">
<summary>
Relabel packets to freeipmi_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_freeipmi_server_packets" lineno="40938">
<summary>
Send freeipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_freeipmi_server_packets" lineno="40957">
<summary>
Do not audit attempts to send freeipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_freeipmi_server_packets" lineno="40976">
<summary>
Receive freeipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_freeipmi_server_packets" lineno="40995">
<summary>
Do not audit attempts to receive freeipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_freeipmi_server_packets" lineno="41014">
<summary>
Send and receive freeipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_freeipmi_server_packets" lineno="41030">
<summary>
Do not audit attempts to send and receive freeipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_freeipmi_server_packets" lineno="41045">
<summary>
Relabel packets to freeipmi_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ftp_port" lineno="41067">
<summary>
Send and receive TCP traffic on the ftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ftp_port" lineno="41086">
<summary>
Send UDP traffic on the ftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ftp_port" lineno="41105">
<summary>
Do not audit attempts to send UDP traffic on the ftp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ftp_port" lineno="41124">
<summary>
Receive UDP traffic on the ftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ftp_port" lineno="41143">
<summary>
Do not audit attempts to receive UDP traffic on the ftp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ftp_port" lineno="41162">
<summary>
Send and receive UDP traffic on the ftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ftp_port" lineno="41179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ftp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ftp_port" lineno="41195">
<summary>
Bind TCP sockets to the ftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ftp_port" lineno="41215">
<summary>
Bind UDP sockets to the ftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ftp_port" lineno="41235">
<summary>
Do not audit attempts to sbind to ftp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ftp_port" lineno="41254">
<summary>
Make a TCP connection to the ftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ftp_port" lineno="41271">
<summary>
Do not audit attempts to make a TCP connection to ftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ftp_client_packets" lineno="41291">
<summary>
Send ftp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ftp_client_packets" lineno="41310">
<summary>
Do not audit attempts to send ftp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ftp_client_packets" lineno="41329">
<summary>
Receive ftp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ftp_client_packets" lineno="41348">
<summary>
Do not audit attempts to receive ftp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ftp_client_packets" lineno="41367">
<summary>
Send and receive ftp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ftp_client_packets" lineno="41383">
<summary>
Do not audit attempts to send and receive ftp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ftp_client_packets" lineno="41398">
<summary>
Relabel packets to ftp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ftp_server_packets" lineno="41418">
<summary>
Send ftp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ftp_server_packets" lineno="41437">
<summary>
Do not audit attempts to send ftp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ftp_server_packets" lineno="41456">
<summary>
Receive ftp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ftp_server_packets" lineno="41475">
<summary>
Do not audit attempts to receive ftp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ftp_server_packets" lineno="41494">
<summary>
Send and receive ftp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ftp_server_packets" lineno="41510">
<summary>
Do not audit attempts to send and receive ftp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ftp_server_packets" lineno="41525">
<summary>
Relabel packets to ftp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ftp_data_port" lineno="41547">
<summary>
Send and receive TCP traffic on the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ftp_data_port" lineno="41566">
<summary>
Send UDP traffic on the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ftp_data_port" lineno="41585">
<summary>
Do not audit attempts to send UDP traffic on the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ftp_data_port" lineno="41604">
<summary>
Receive UDP traffic on the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ftp_data_port" lineno="41623">
<summary>
Do not audit attempts to receive UDP traffic on the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ftp_data_port" lineno="41642">
<summary>
Send and receive UDP traffic on the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ftp_data_port" lineno="41659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ftp_data_port" lineno="41675">
<summary>
Bind TCP sockets to the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ftp_data_port" lineno="41695">
<summary>
Bind UDP sockets to the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ftp_data_port" lineno="41715">
<summary>
Do not audit attempts to sbind to ftp_data port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ftp_data_port" lineno="41734">
<summary>
Make a TCP connection to the ftp_data port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ftp_data_port" lineno="41751">
<summary>
Do not audit attempts to make a TCP connection to ftp_data port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ftp_data_client_packets" lineno="41771">
<summary>
Send ftp_data_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ftp_data_client_packets" lineno="41790">
<summary>
Do not audit attempts to send ftp_data_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ftp_data_client_packets" lineno="41809">
<summary>
Receive ftp_data_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ftp_data_client_packets" lineno="41828">
<summary>
Do not audit attempts to receive ftp_data_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ftp_data_client_packets" lineno="41847">
<summary>
Send and receive ftp_data_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ftp_data_client_packets" lineno="41863">
<summary>
Do not audit attempts to send and receive ftp_data_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ftp_data_client_packets" lineno="41878">
<summary>
Relabel packets to ftp_data_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ftp_data_server_packets" lineno="41898">
<summary>
Send ftp_data_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ftp_data_server_packets" lineno="41917">
<summary>
Do not audit attempts to send ftp_data_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ftp_data_server_packets" lineno="41936">
<summary>
Receive ftp_data_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ftp_data_server_packets" lineno="41955">
<summary>
Do not audit attempts to receive ftp_data_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ftp_data_server_packets" lineno="41974">
<summary>
Send and receive ftp_data_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ftp_data_server_packets" lineno="41990">
<summary>
Do not audit attempts to send and receive ftp_data_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ftp_data_server_packets" lineno="42005">
<summary>
Relabel packets to ftp_data_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_gatekeeper_port" lineno="42027">
<summary>
Send and receive TCP traffic on the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_gatekeeper_port" lineno="42046">
<summary>
Send UDP traffic on the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_gatekeeper_port" lineno="42065">
<summary>
Do not audit attempts to send UDP traffic on the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_gatekeeper_port" lineno="42084">
<summary>
Receive UDP traffic on the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_gatekeeper_port" lineno="42103">
<summary>
Do not audit attempts to receive UDP traffic on the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_gatekeeper_port" lineno="42122">
<summary>
Send and receive UDP traffic on the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_gatekeeper_port" lineno="42139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_gatekeeper_port" lineno="42155">
<summary>
Bind TCP sockets to the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_gatekeeper_port" lineno="42175">
<summary>
Bind UDP sockets to the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_gatekeeper_port" lineno="42195">
<summary>
Do not audit attempts to sbind to gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_gatekeeper_port" lineno="42214">
<summary>
Make a TCP connection to the gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_gatekeeper_port" lineno="42231">
<summary>
Do not audit attempts to make a TCP connection to gatekeeper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gatekeeper_client_packets" lineno="42251">
<summary>
Send gatekeeper_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gatekeeper_client_packets" lineno="42270">
<summary>
Do not audit attempts to send gatekeeper_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gatekeeper_client_packets" lineno="42289">
<summary>
Receive gatekeeper_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gatekeeper_client_packets" lineno="42308">
<summary>
Do not audit attempts to receive gatekeeper_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gatekeeper_client_packets" lineno="42327">
<summary>
Send and receive gatekeeper_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gatekeeper_client_packets" lineno="42343">
<summary>
Do not audit attempts to send and receive gatekeeper_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gatekeeper_client_packets" lineno="42358">
<summary>
Relabel packets to gatekeeper_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gatekeeper_server_packets" lineno="42378">
<summary>
Send gatekeeper_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gatekeeper_server_packets" lineno="42397">
<summary>
Do not audit attempts to send gatekeeper_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gatekeeper_server_packets" lineno="42416">
<summary>
Receive gatekeeper_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gatekeeper_server_packets" lineno="42435">
<summary>
Do not audit attempts to receive gatekeeper_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gatekeeper_server_packets" lineno="42454">
<summary>
Send and receive gatekeeper_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gatekeeper_server_packets" lineno="42470">
<summary>
Do not audit attempts to send and receive gatekeeper_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gatekeeper_server_packets" lineno="42485">
<summary>
Relabel packets to gatekeeper_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_gear_port" lineno="42507">
<summary>
Send and receive TCP traffic on the gear port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_gear_port" lineno="42526">
<summary>
Send UDP traffic on the gear port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_gear_port" lineno="42545">
<summary>
Do not audit attempts to send UDP traffic on the gear port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_gear_port" lineno="42564">
<summary>
Receive UDP traffic on the gear port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_gear_port" lineno="42583">
<summary>
Do not audit attempts to receive UDP traffic on the gear port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_gear_port" lineno="42602">
<summary>
Send and receive UDP traffic on the gear port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_gear_port" lineno="42619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gear port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_gear_port" lineno="42635">
<summary>
Bind TCP sockets to the gear port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_gear_port" lineno="42655">
<summary>
Bind UDP sockets to the gear port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_gear_port" lineno="42675">
<summary>
Do not audit attempts to sbind to gear port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_gear_port" lineno="42694">
<summary>
Make a TCP connection to the gear port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_gear_port" lineno="42711">
<summary>
Do not audit attempts to make a TCP connection to gear port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gear_client_packets" lineno="42731">
<summary>
Send gear_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gear_client_packets" lineno="42750">
<summary>
Do not audit attempts to send gear_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gear_client_packets" lineno="42769">
<summary>
Receive gear_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gear_client_packets" lineno="42788">
<summary>
Do not audit attempts to receive gear_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gear_client_packets" lineno="42807">
<summary>
Send and receive gear_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gear_client_packets" lineno="42823">
<summary>
Do not audit attempts to send and receive gear_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gear_client_packets" lineno="42838">
<summary>
Relabel packets to gear_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gear_server_packets" lineno="42858">
<summary>
Send gear_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gear_server_packets" lineno="42877">
<summary>
Do not audit attempts to send gear_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gear_server_packets" lineno="42896">
<summary>
Receive gear_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gear_server_packets" lineno="42915">
<summary>
Do not audit attempts to receive gear_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gear_server_packets" lineno="42934">
<summary>
Send and receive gear_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gear_server_packets" lineno="42950">
<summary>
Do not audit attempts to send and receive gear_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gear_server_packets" lineno="42965">
<summary>
Relabel packets to gear_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_geneve_port" lineno="42987">
<summary>
Send and receive TCP traffic on the geneve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_geneve_port" lineno="43006">
<summary>
Send UDP traffic on the geneve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_geneve_port" lineno="43025">
<summary>
Do not audit attempts to send UDP traffic on the geneve port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_geneve_port" lineno="43044">
<summary>
Receive UDP traffic on the geneve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_geneve_port" lineno="43063">
<summary>
Do not audit attempts to receive UDP traffic on the geneve port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_geneve_port" lineno="43082">
<summary>
Send and receive UDP traffic on the geneve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_geneve_port" lineno="43099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the geneve port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_geneve_port" lineno="43115">
<summary>
Bind TCP sockets to the geneve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_geneve_port" lineno="43135">
<summary>
Bind UDP sockets to the geneve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_geneve_port" lineno="43155">
<summary>
Do not audit attempts to sbind to geneve port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_geneve_port" lineno="43174">
<summary>
Make a TCP connection to the geneve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_geneve_port" lineno="43191">
<summary>
Do not audit attempts to make a TCP connection to geneve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_geneve_client_packets" lineno="43211">
<summary>
Send geneve_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_geneve_client_packets" lineno="43230">
<summary>
Do not audit attempts to send geneve_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_geneve_client_packets" lineno="43249">
<summary>
Receive geneve_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_geneve_client_packets" lineno="43268">
<summary>
Do not audit attempts to receive geneve_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_geneve_client_packets" lineno="43287">
<summary>
Send and receive geneve_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_geneve_client_packets" lineno="43303">
<summary>
Do not audit attempts to send and receive geneve_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_geneve_client_packets" lineno="43318">
<summary>
Relabel packets to geneve_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_geneve_server_packets" lineno="43338">
<summary>
Send geneve_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_geneve_server_packets" lineno="43357">
<summary>
Do not audit attempts to send geneve_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_geneve_server_packets" lineno="43376">
<summary>
Receive geneve_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_geneve_server_packets" lineno="43395">
<summary>
Do not audit attempts to receive geneve_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_geneve_server_packets" lineno="43414">
<summary>
Send and receive geneve_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_geneve_server_packets" lineno="43430">
<summary>
Do not audit attempts to send and receive geneve_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_geneve_server_packets" lineno="43445">
<summary>
Relabel packets to geneve_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_gdomap_port" lineno="43467">
<summary>
Send and receive TCP traffic on the gdomap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_gdomap_port" lineno="43486">
<summary>
Send UDP traffic on the gdomap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_gdomap_port" lineno="43505">
<summary>
Do not audit attempts to send UDP traffic on the gdomap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_gdomap_port" lineno="43524">
<summary>
Receive UDP traffic on the gdomap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_gdomap_port" lineno="43543">
<summary>
Do not audit attempts to receive UDP traffic on the gdomap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_gdomap_port" lineno="43562">
<summary>
Send and receive UDP traffic on the gdomap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_gdomap_port" lineno="43579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gdomap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_gdomap_port" lineno="43595">
<summary>
Bind TCP sockets to the gdomap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_gdomap_port" lineno="43615">
<summary>
Bind UDP sockets to the gdomap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_gdomap_port" lineno="43635">
<summary>
Do not audit attempts to sbind to gdomap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_gdomap_port" lineno="43654">
<summary>
Make a TCP connection to the gdomap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_gdomap_port" lineno="43671">
<summary>
Do not audit attempts to make a TCP connection to gdomap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gdomap_client_packets" lineno="43691">
<summary>
Send gdomap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gdomap_client_packets" lineno="43710">
<summary>
Do not audit attempts to send gdomap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gdomap_client_packets" lineno="43729">
<summary>
Receive gdomap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gdomap_client_packets" lineno="43748">
<summary>
Do not audit attempts to receive gdomap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gdomap_client_packets" lineno="43767">
<summary>
Send and receive gdomap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gdomap_client_packets" lineno="43783">
<summary>
Do not audit attempts to send and receive gdomap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gdomap_client_packets" lineno="43798">
<summary>
Relabel packets to gdomap_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gdomap_server_packets" lineno="43818">
<summary>
Send gdomap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gdomap_server_packets" lineno="43837">
<summary>
Do not audit attempts to send gdomap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gdomap_server_packets" lineno="43856">
<summary>
Receive gdomap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gdomap_server_packets" lineno="43875">
<summary>
Do not audit attempts to receive gdomap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gdomap_server_packets" lineno="43894">
<summary>
Send and receive gdomap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gdomap_server_packets" lineno="43910">
<summary>
Do not audit attempts to send and receive gdomap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gdomap_server_packets" lineno="43925">
<summary>
Relabel packets to gdomap_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_gds_db_port" lineno="43947">
<summary>
Send and receive TCP traffic on the gds_db port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_gds_db_port" lineno="43966">
<summary>
Send UDP traffic on the gds_db port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_gds_db_port" lineno="43985">
<summary>
Do not audit attempts to send UDP traffic on the gds_db port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_gds_db_port" lineno="44004">
<summary>
Receive UDP traffic on the gds_db port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_gds_db_port" lineno="44023">
<summary>
Do not audit attempts to receive UDP traffic on the gds_db port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_gds_db_port" lineno="44042">
<summary>
Send and receive UDP traffic on the gds_db port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_gds_db_port" lineno="44059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gds_db port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_gds_db_port" lineno="44075">
<summary>
Bind TCP sockets to the gds_db port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_gds_db_port" lineno="44095">
<summary>
Bind UDP sockets to the gds_db port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_gds_db_port" lineno="44115">
<summary>
Do not audit attempts to sbind to gds_db port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_gds_db_port" lineno="44134">
<summary>
Make a TCP connection to the gds_db port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_gds_db_port" lineno="44151">
<summary>
Do not audit attempts to make a TCP connection to gds_db port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gds_db_client_packets" lineno="44171">
<summary>
Send gds_db_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gds_db_client_packets" lineno="44190">
<summary>
Do not audit attempts to send gds_db_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gds_db_client_packets" lineno="44209">
<summary>
Receive gds_db_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gds_db_client_packets" lineno="44228">
<summary>
Do not audit attempts to receive gds_db_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gds_db_client_packets" lineno="44247">
<summary>
Send and receive gds_db_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gds_db_client_packets" lineno="44263">
<summary>
Do not audit attempts to send and receive gds_db_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gds_db_client_packets" lineno="44278">
<summary>
Relabel packets to gds_db_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gds_db_server_packets" lineno="44298">
<summary>
Send gds_db_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gds_db_server_packets" lineno="44317">
<summary>
Do not audit attempts to send gds_db_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gds_db_server_packets" lineno="44336">
<summary>
Receive gds_db_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gds_db_server_packets" lineno="44355">
<summary>
Do not audit attempts to receive gds_db_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gds_db_server_packets" lineno="44374">
<summary>
Send and receive gds_db_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gds_db_server_packets" lineno="44390">
<summary>
Do not audit attempts to send and receive gds_db_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gds_db_server_packets" lineno="44405">
<summary>
Relabel packets to gds_db_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_giftd_port" lineno="44427">
<summary>
Send and receive TCP traffic on the giftd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_giftd_port" lineno="44446">
<summary>
Send UDP traffic on the giftd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_giftd_port" lineno="44465">
<summary>
Do not audit attempts to send UDP traffic on the giftd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_giftd_port" lineno="44484">
<summary>
Receive UDP traffic on the giftd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_giftd_port" lineno="44503">
<summary>
Do not audit attempts to receive UDP traffic on the giftd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_giftd_port" lineno="44522">
<summary>
Send and receive UDP traffic on the giftd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_giftd_port" lineno="44539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the giftd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_giftd_port" lineno="44555">
<summary>
Bind TCP sockets to the giftd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_giftd_port" lineno="44575">
<summary>
Bind UDP sockets to the giftd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_giftd_port" lineno="44595">
<summary>
Do not audit attempts to sbind to giftd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_giftd_port" lineno="44614">
<summary>
Make a TCP connection to the giftd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_giftd_port" lineno="44631">
<summary>
Do not audit attempts to make a TCP connection to giftd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_giftd_client_packets" lineno="44651">
<summary>
Send giftd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_giftd_client_packets" lineno="44670">
<summary>
Do not audit attempts to send giftd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_giftd_client_packets" lineno="44689">
<summary>
Receive giftd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_giftd_client_packets" lineno="44708">
<summary>
Do not audit attempts to receive giftd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_giftd_client_packets" lineno="44727">
<summary>
Send and receive giftd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_giftd_client_packets" lineno="44743">
<summary>
Do not audit attempts to send and receive giftd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_giftd_client_packets" lineno="44758">
<summary>
Relabel packets to giftd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_giftd_server_packets" lineno="44778">
<summary>
Send giftd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_giftd_server_packets" lineno="44797">
<summary>
Do not audit attempts to send giftd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_giftd_server_packets" lineno="44816">
<summary>
Receive giftd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_giftd_server_packets" lineno="44835">
<summary>
Do not audit attempts to receive giftd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_giftd_server_packets" lineno="44854">
<summary>
Send and receive giftd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_giftd_server_packets" lineno="44870">
<summary>
Do not audit attempts to send and receive giftd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_giftd_server_packets" lineno="44885">
<summary>
Relabel packets to giftd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_git_port" lineno="44907">
<summary>
Send and receive TCP traffic on the git port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_git_port" lineno="44926">
<summary>
Send UDP traffic on the git port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_git_port" lineno="44945">
<summary>
Do not audit attempts to send UDP traffic on the git port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_git_port" lineno="44964">
<summary>
Receive UDP traffic on the git port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_git_port" lineno="44983">
<summary>
Do not audit attempts to receive UDP traffic on the git port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_git_port" lineno="45002">
<summary>
Send and receive UDP traffic on the git port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_git_port" lineno="45019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the git port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_git_port" lineno="45035">
<summary>
Bind TCP sockets to the git port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_git_port" lineno="45055">
<summary>
Bind UDP sockets to the git port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_git_port" lineno="45075">
<summary>
Do not audit attempts to sbind to git port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_git_port" lineno="45094">
<summary>
Make a TCP connection to the git port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_git_port" lineno="45111">
<summary>
Do not audit attempts to make a TCP connection to git port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_git_client_packets" lineno="45131">
<summary>
Send git_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_git_client_packets" lineno="45150">
<summary>
Do not audit attempts to send git_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_git_client_packets" lineno="45169">
<summary>
Receive git_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_git_client_packets" lineno="45188">
<summary>
Do not audit attempts to receive git_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_git_client_packets" lineno="45207">
<summary>
Send and receive git_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_git_client_packets" lineno="45223">
<summary>
Do not audit attempts to send and receive git_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_git_client_packets" lineno="45238">
<summary>
Relabel packets to git_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_git_server_packets" lineno="45258">
<summary>
Send git_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_git_server_packets" lineno="45277">
<summary>
Do not audit attempts to send git_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_git_server_packets" lineno="45296">
<summary>
Receive git_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_git_server_packets" lineno="45315">
<summary>
Do not audit attempts to receive git_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_git_server_packets" lineno="45334">
<summary>
Send and receive git_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_git_server_packets" lineno="45350">
<summary>
Do not audit attempts to send and receive git_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_git_server_packets" lineno="45365">
<summary>
Relabel packets to git_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_glance_port" lineno="45387">
<summary>
Send and receive TCP traffic on the glance port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_glance_port" lineno="45406">
<summary>
Send UDP traffic on the glance port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_glance_port" lineno="45425">
<summary>
Do not audit attempts to send UDP traffic on the glance port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_glance_port" lineno="45444">
<summary>
Receive UDP traffic on the glance port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_glance_port" lineno="45463">
<summary>
Do not audit attempts to receive UDP traffic on the glance port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_glance_port" lineno="45482">
<summary>
Send and receive UDP traffic on the glance port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_glance_port" lineno="45499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the glance port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_glance_port" lineno="45515">
<summary>
Bind TCP sockets to the glance port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_glance_port" lineno="45535">
<summary>
Bind UDP sockets to the glance port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_glance_port" lineno="45555">
<summary>
Do not audit attempts to sbind to glance port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_glance_port" lineno="45574">
<summary>
Make a TCP connection to the glance port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_glance_port" lineno="45591">
<summary>
Do not audit attempts to make a TCP connection to glance port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_glance_client_packets" lineno="45611">
<summary>
Send glance_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_glance_client_packets" lineno="45630">
<summary>
Do not audit attempts to send glance_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_glance_client_packets" lineno="45649">
<summary>
Receive glance_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_glance_client_packets" lineno="45668">
<summary>
Do not audit attempts to receive glance_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_glance_client_packets" lineno="45687">
<summary>
Send and receive glance_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_glance_client_packets" lineno="45703">
<summary>
Do not audit attempts to send and receive glance_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_glance_client_packets" lineno="45718">
<summary>
Relabel packets to glance_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_glance_server_packets" lineno="45738">
<summary>
Send glance_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_glance_server_packets" lineno="45757">
<summary>
Do not audit attempts to send glance_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_glance_server_packets" lineno="45776">
<summary>
Receive glance_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_glance_server_packets" lineno="45795">
<summary>
Do not audit attempts to receive glance_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_glance_server_packets" lineno="45814">
<summary>
Send and receive glance_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_glance_server_packets" lineno="45830">
<summary>
Do not audit attempts to send and receive glance_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_glance_server_packets" lineno="45845">
<summary>
Relabel packets to glance_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_glance_registry_port" lineno="45867">
<summary>
Send and receive TCP traffic on the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_glance_registry_port" lineno="45886">
<summary>
Send UDP traffic on the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_glance_registry_port" lineno="45905">
<summary>
Do not audit attempts to send UDP traffic on the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_glance_registry_port" lineno="45924">
<summary>
Receive UDP traffic on the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_glance_registry_port" lineno="45943">
<summary>
Do not audit attempts to receive UDP traffic on the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_glance_registry_port" lineno="45962">
<summary>
Send and receive UDP traffic on the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_glance_registry_port" lineno="45979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_glance_registry_port" lineno="45995">
<summary>
Bind TCP sockets to the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_glance_registry_port" lineno="46015">
<summary>
Bind UDP sockets to the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_glance_registry_port" lineno="46035">
<summary>
Do not audit attempts to sbind to glance_registry port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_glance_registry_port" lineno="46054">
<summary>
Make a TCP connection to the glance_registry port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_glance_registry_port" lineno="46071">
<summary>
Do not audit attempts to make a TCP connection to glance_registry port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_glance_registry_client_packets" lineno="46091">
<summary>
Send glance_registry_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_glance_registry_client_packets" lineno="46110">
<summary>
Do not audit attempts to send glance_registry_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_glance_registry_client_packets" lineno="46129">
<summary>
Receive glance_registry_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_glance_registry_client_packets" lineno="46148">
<summary>
Do not audit attempts to receive glance_registry_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_glance_registry_client_packets" lineno="46167">
<summary>
Send and receive glance_registry_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_glance_registry_client_packets" lineno="46183">
<summary>
Do not audit attempts to send and receive glance_registry_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_glance_registry_client_packets" lineno="46198">
<summary>
Relabel packets to glance_registry_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_glance_registry_server_packets" lineno="46218">
<summary>
Send glance_registry_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_glance_registry_server_packets" lineno="46237">
<summary>
Do not audit attempts to send glance_registry_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_glance_registry_server_packets" lineno="46256">
<summary>
Receive glance_registry_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_glance_registry_server_packets" lineno="46275">
<summary>
Do not audit attempts to receive glance_registry_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_glance_registry_server_packets" lineno="46294">
<summary>
Send and receive glance_registry_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_glance_registry_server_packets" lineno="46310">
<summary>
Do not audit attempts to send and receive glance_registry_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_glance_registry_server_packets" lineno="46325">
<summary>
Relabel packets to glance_registry_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_gluster_port" lineno="46347">
<summary>
Send and receive TCP traffic on the gluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_gluster_port" lineno="46366">
<summary>
Send UDP traffic on the gluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_gluster_port" lineno="46385">
<summary>
Do not audit attempts to send UDP traffic on the gluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_gluster_port" lineno="46404">
<summary>
Receive UDP traffic on the gluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_gluster_port" lineno="46423">
<summary>
Do not audit attempts to receive UDP traffic on the gluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_gluster_port" lineno="46442">
<summary>
Send and receive UDP traffic on the gluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_gluster_port" lineno="46459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_gluster_port" lineno="46475">
<summary>
Bind TCP sockets to the gluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_gluster_port" lineno="46495">
<summary>
Bind UDP sockets to the gluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_gluster_port" lineno="46515">
<summary>
Do not audit attempts to sbind to gluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_gluster_port" lineno="46534">
<summary>
Make a TCP connection to the gluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_gluster_port" lineno="46551">
<summary>
Do not audit attempts to make a TCP connection to gluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gluster_client_packets" lineno="46571">
<summary>
Send gluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gluster_client_packets" lineno="46590">
<summary>
Do not audit attempts to send gluster_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gluster_client_packets" lineno="46609">
<summary>
Receive gluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gluster_client_packets" lineno="46628">
<summary>
Do not audit attempts to receive gluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gluster_client_packets" lineno="46647">
<summary>
Send and receive gluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gluster_client_packets" lineno="46663">
<summary>
Do not audit attempts to send and receive gluster_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gluster_client_packets" lineno="46678">
<summary>
Relabel packets to gluster_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gluster_server_packets" lineno="46698">
<summary>
Send gluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gluster_server_packets" lineno="46717">
<summary>
Do not audit attempts to send gluster_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gluster_server_packets" lineno="46736">
<summary>
Receive gluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gluster_server_packets" lineno="46755">
<summary>
Do not audit attempts to receive gluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gluster_server_packets" lineno="46774">
<summary>
Send and receive gluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gluster_server_packets" lineno="46790">
<summary>
Do not audit attempts to send and receive gluster_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gluster_server_packets" lineno="46805">
<summary>
Relabel packets to gluster_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_gopher_port" lineno="46827">
<summary>
Send and receive TCP traffic on the gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_gopher_port" lineno="46846">
<summary>
Send UDP traffic on the gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_gopher_port" lineno="46865">
<summary>
Do not audit attempts to send UDP traffic on the gopher port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_gopher_port" lineno="46884">
<summary>
Receive UDP traffic on the gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_gopher_port" lineno="46903">
<summary>
Do not audit attempts to receive UDP traffic on the gopher port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_gopher_port" lineno="46922">
<summary>
Send and receive UDP traffic on the gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_gopher_port" lineno="46939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gopher port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_gopher_port" lineno="46955">
<summary>
Bind TCP sockets to the gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_gopher_port" lineno="46975">
<summary>
Bind UDP sockets to the gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_gopher_port" lineno="46995">
<summary>
Do not audit attempts to sbind to gopher port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_gopher_port" lineno="47014">
<summary>
Make a TCP connection to the gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_gopher_port" lineno="47031">
<summary>
Do not audit attempts to make a TCP connection to gopher port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gopher_client_packets" lineno="47051">
<summary>
Send gopher_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gopher_client_packets" lineno="47070">
<summary>
Do not audit attempts to send gopher_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gopher_client_packets" lineno="47089">
<summary>
Receive gopher_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gopher_client_packets" lineno="47108">
<summary>
Do not audit attempts to receive gopher_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gopher_client_packets" lineno="47127">
<summary>
Send and receive gopher_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gopher_client_packets" lineno="47143">
<summary>
Do not audit attempts to send and receive gopher_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gopher_client_packets" lineno="47158">
<summary>
Relabel packets to gopher_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gopher_server_packets" lineno="47178">
<summary>
Send gopher_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gopher_server_packets" lineno="47197">
<summary>
Do not audit attempts to send gopher_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gopher_server_packets" lineno="47216">
<summary>
Receive gopher_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gopher_server_packets" lineno="47235">
<summary>
Do not audit attempts to receive gopher_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gopher_server_packets" lineno="47254">
<summary>
Send and receive gopher_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gopher_server_packets" lineno="47270">
<summary>
Do not audit attempts to send and receive gopher_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gopher_server_packets" lineno="47285">
<summary>
Relabel packets to gopher_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_gpsd_port" lineno="47307">
<summary>
Send and receive TCP traffic on the gpsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_gpsd_port" lineno="47326">
<summary>
Send UDP traffic on the gpsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_gpsd_port" lineno="47345">
<summary>
Do not audit attempts to send UDP traffic on the gpsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_gpsd_port" lineno="47364">
<summary>
Receive UDP traffic on the gpsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_gpsd_port" lineno="47383">
<summary>
Do not audit attempts to receive UDP traffic on the gpsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_gpsd_port" lineno="47402">
<summary>
Send and receive UDP traffic on the gpsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_gpsd_port" lineno="47419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the gpsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_gpsd_port" lineno="47435">
<summary>
Bind TCP sockets to the gpsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_gpsd_port" lineno="47455">
<summary>
Bind UDP sockets to the gpsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_gpsd_port" lineno="47475">
<summary>
Do not audit attempts to sbind to gpsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_gpsd_port" lineno="47494">
<summary>
Make a TCP connection to the gpsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_gpsd_port" lineno="47511">
<summary>
Do not audit attempts to make a TCP connection to gpsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gpsd_client_packets" lineno="47531">
<summary>
Send gpsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gpsd_client_packets" lineno="47550">
<summary>
Do not audit attempts to send gpsd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gpsd_client_packets" lineno="47569">
<summary>
Receive gpsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gpsd_client_packets" lineno="47588">
<summary>
Do not audit attempts to receive gpsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gpsd_client_packets" lineno="47607">
<summary>
Send and receive gpsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gpsd_client_packets" lineno="47623">
<summary>
Do not audit attempts to send and receive gpsd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gpsd_client_packets" lineno="47638">
<summary>
Relabel packets to gpsd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_gpsd_server_packets" lineno="47658">
<summary>
Send gpsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_gpsd_server_packets" lineno="47677">
<summary>
Do not audit attempts to send gpsd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_gpsd_server_packets" lineno="47696">
<summary>
Receive gpsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_gpsd_server_packets" lineno="47715">
<summary>
Do not audit attempts to receive gpsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_gpsd_server_packets" lineno="47734">
<summary>
Send and receive gpsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_gpsd_server_packets" lineno="47750">
<summary>
Do not audit attempts to send and receive gpsd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_gpsd_server_packets" lineno="47765">
<summary>
Relabel packets to gpsd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_hadoop_datanode_port" lineno="47787">
<summary>
Send and receive TCP traffic on the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_hadoop_datanode_port" lineno="47806">
<summary>
Send UDP traffic on the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_hadoop_datanode_port" lineno="47825">
<summary>
Do not audit attempts to send UDP traffic on the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_hadoop_datanode_port" lineno="47844">
<summary>
Receive UDP traffic on the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_hadoop_datanode_port" lineno="47863">
<summary>
Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_hadoop_datanode_port" lineno="47882">
<summary>
Send and receive UDP traffic on the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_hadoop_datanode_port" lineno="47899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_hadoop_datanode_port" lineno="47915">
<summary>
Bind TCP sockets to the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_hadoop_datanode_port" lineno="47935">
<summary>
Bind UDP sockets to the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_hadoop_datanode_port" lineno="47955">
<summary>
Do not audit attempts to sbind to hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_hadoop_datanode_port" lineno="47974">
<summary>
Make a TCP connection to the hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_hadoop_datanode_port" lineno="47991">
<summary>
Do not audit attempts to make a TCP connection to hadoop_datanode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_hadoop_datanode_client_packets" lineno="48011">
<summary>
Send hadoop_datanode_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_hadoop_datanode_client_packets" lineno="48030">
<summary>
Do not audit attempts to send hadoop_datanode_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_hadoop_datanode_client_packets" lineno="48049">
<summary>
Receive hadoop_datanode_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_hadoop_datanode_client_packets" lineno="48068">
<summary>
Do not audit attempts to receive hadoop_datanode_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_hadoop_datanode_client_packets" lineno="48087">
<summary>
Send and receive hadoop_datanode_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_client_packets" lineno="48103">
<summary>
Do not audit attempts to send and receive hadoop_datanode_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_hadoop_datanode_client_packets" lineno="48118">
<summary>
Relabel packets to hadoop_datanode_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_hadoop_datanode_server_packets" lineno="48138">
<summary>
Send hadoop_datanode_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_hadoop_datanode_server_packets" lineno="48157">
<summary>
Do not audit attempts to send hadoop_datanode_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_hadoop_datanode_server_packets" lineno="48176">
<summary>
Receive hadoop_datanode_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_hadoop_datanode_server_packets" lineno="48195">
<summary>
Do not audit attempts to receive hadoop_datanode_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_hadoop_datanode_server_packets" lineno="48214">
<summary>
Send and receive hadoop_datanode_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_hadoop_datanode_server_packets" lineno="48230">
<summary>
Do not audit attempts to send and receive hadoop_datanode_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_hadoop_datanode_server_packets" lineno="48245">
<summary>
Relabel packets to hadoop_datanode_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_hadoop_namenode_port" lineno="48267">
<summary>
Send and receive TCP traffic on the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_hadoop_namenode_port" lineno="48286">
<summary>
Send UDP traffic on the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_hadoop_namenode_port" lineno="48305">
<summary>
Do not audit attempts to send UDP traffic on the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_hadoop_namenode_port" lineno="48324">
<summary>
Receive UDP traffic on the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_hadoop_namenode_port" lineno="48343">
<summary>
Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_hadoop_namenode_port" lineno="48362">
<summary>
Send and receive UDP traffic on the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_hadoop_namenode_port" lineno="48379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_hadoop_namenode_port" lineno="48395">
<summary>
Bind TCP sockets to the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_hadoop_namenode_port" lineno="48415">
<summary>
Bind UDP sockets to the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_hadoop_namenode_port" lineno="48435">
<summary>
Do not audit attempts to sbind to hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_hadoop_namenode_port" lineno="48454">
<summary>
Make a TCP connection to the hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_hadoop_namenode_port" lineno="48471">
<summary>
Do not audit attempts to make a TCP connection to hadoop_namenode port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_hadoop_namenode_client_packets" lineno="48491">
<summary>
Send hadoop_namenode_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_hadoop_namenode_client_packets" lineno="48510">
<summary>
Do not audit attempts to send hadoop_namenode_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_hadoop_namenode_client_packets" lineno="48529">
<summary>
Receive hadoop_namenode_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_hadoop_namenode_client_packets" lineno="48548">
<summary>
Do not audit attempts to receive hadoop_namenode_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_hadoop_namenode_client_packets" lineno="48567">
<summary>
Send and receive hadoop_namenode_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_client_packets" lineno="48583">
<summary>
Do not audit attempts to send and receive hadoop_namenode_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_hadoop_namenode_client_packets" lineno="48598">
<summary>
Relabel packets to hadoop_namenode_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_hadoop_namenode_server_packets" lineno="48618">
<summary>
Send hadoop_namenode_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_hadoop_namenode_server_packets" lineno="48637">
<summary>
Do not audit attempts to send hadoop_namenode_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_hadoop_namenode_server_packets" lineno="48656">
<summary>
Receive hadoop_namenode_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_hadoop_namenode_server_packets" lineno="48675">
<summary>
Do not audit attempts to receive hadoop_namenode_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_hadoop_namenode_server_packets" lineno="48694">
<summary>
Send and receive hadoop_namenode_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_hadoop_namenode_server_packets" lineno="48710">
<summary>
Do not audit attempts to send and receive hadoop_namenode_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_hadoop_namenode_server_packets" lineno="48725">
<summary>
Relabel packets to hadoop_namenode_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_hddtemp_port" lineno="48747">
<summary>
Send and receive TCP traffic on the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_hddtemp_port" lineno="48766">
<summary>
Send UDP traffic on the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_hddtemp_port" lineno="48785">
<summary>
Do not audit attempts to send UDP traffic on the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_hddtemp_port" lineno="48804">
<summary>
Receive UDP traffic on the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_hddtemp_port" lineno="48823">
<summary>
Do not audit attempts to receive UDP traffic on the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_hddtemp_port" lineno="48842">
<summary>
Send and receive UDP traffic on the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_hddtemp_port" lineno="48859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_hddtemp_port" lineno="48875">
<summary>
Bind TCP sockets to the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_hddtemp_port" lineno="48895">
<summary>
Bind UDP sockets to the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_hddtemp_port" lineno="48915">
<summary>
Do not audit attempts to sbind to hddtemp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_hddtemp_port" lineno="48934">
<summary>
Make a TCP connection to the hddtemp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_hddtemp_port" lineno="48951">
<summary>
Do not audit attempts to make a TCP connection to hddtemp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_hddtemp_client_packets" lineno="48971">
<summary>
Send hddtemp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_hddtemp_client_packets" lineno="48990">
<summary>
Do not audit attempts to send hddtemp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_hddtemp_client_packets" lineno="49009">
<summary>
Receive hddtemp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_hddtemp_client_packets" lineno="49028">
<summary>
Do not audit attempts to receive hddtemp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_hddtemp_client_packets" lineno="49047">
<summary>
Send and receive hddtemp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_hddtemp_client_packets" lineno="49063">
<summary>
Do not audit attempts to send and receive hddtemp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_hddtemp_client_packets" lineno="49078">
<summary>
Relabel packets to hddtemp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_hddtemp_server_packets" lineno="49098">
<summary>
Send hddtemp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_hddtemp_server_packets" lineno="49117">
<summary>
Do not audit attempts to send hddtemp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_hddtemp_server_packets" lineno="49136">
<summary>
Receive hddtemp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_hddtemp_server_packets" lineno="49155">
<summary>
Do not audit attempts to receive hddtemp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_hddtemp_server_packets" lineno="49174">
<summary>
Send and receive hddtemp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_hddtemp_server_packets" lineno="49190">
<summary>
Do not audit attempts to send and receive hddtemp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_hddtemp_server_packets" lineno="49205">
<summary>
Relabel packets to hddtemp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_howl_port" lineno="49227">
<summary>
Send and receive TCP traffic on the howl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_howl_port" lineno="49246">
<summary>
Send UDP traffic on the howl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_howl_port" lineno="49265">
<summary>
Do not audit attempts to send UDP traffic on the howl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_howl_port" lineno="49284">
<summary>
Receive UDP traffic on the howl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_howl_port" lineno="49303">
<summary>
Do not audit attempts to receive UDP traffic on the howl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_howl_port" lineno="49322">
<summary>
Send and receive UDP traffic on the howl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_howl_port" lineno="49339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the howl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_howl_port" lineno="49355">
<summary>
Bind TCP sockets to the howl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_howl_port" lineno="49375">
<summary>
Bind UDP sockets to the howl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_howl_port" lineno="49395">
<summary>
Do not audit attempts to sbind to howl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_howl_port" lineno="49414">
<summary>
Make a TCP connection to the howl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_howl_port" lineno="49431">
<summary>
Do not audit attempts to make a TCP connection to howl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_howl_client_packets" lineno="49451">
<summary>
Send howl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_howl_client_packets" lineno="49470">
<summary>
Do not audit attempts to send howl_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_howl_client_packets" lineno="49489">
<summary>
Receive howl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_howl_client_packets" lineno="49508">
<summary>
Do not audit attempts to receive howl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_howl_client_packets" lineno="49527">
<summary>
Send and receive howl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_howl_client_packets" lineno="49543">
<summary>
Do not audit attempts to send and receive howl_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_howl_client_packets" lineno="49558">
<summary>
Relabel packets to howl_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_howl_server_packets" lineno="49578">
<summary>
Send howl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_howl_server_packets" lineno="49597">
<summary>
Do not audit attempts to send howl_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_howl_server_packets" lineno="49616">
<summary>
Receive howl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_howl_server_packets" lineno="49635">
<summary>
Do not audit attempts to receive howl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_howl_server_packets" lineno="49654">
<summary>
Send and receive howl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_howl_server_packets" lineno="49670">
<summary>
Do not audit attempts to send and receive howl_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_howl_server_packets" lineno="49685">
<summary>
Relabel packets to howl_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_hplip_port" lineno="49707">
<summary>
Send and receive TCP traffic on the hplip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_hplip_port" lineno="49726">
<summary>
Send UDP traffic on the hplip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_hplip_port" lineno="49745">
<summary>
Do not audit attempts to send UDP traffic on the hplip port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_hplip_port" lineno="49764">
<summary>
Receive UDP traffic on the hplip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_hplip_port" lineno="49783">
<summary>
Do not audit attempts to receive UDP traffic on the hplip port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_hplip_port" lineno="49802">
<summary>
Send and receive UDP traffic on the hplip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_hplip_port" lineno="49819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the hplip port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_hplip_port" lineno="49835">
<summary>
Bind TCP sockets to the hplip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_hplip_port" lineno="49855">
<summary>
Bind UDP sockets to the hplip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_hplip_port" lineno="49875">
<summary>
Do not audit attempts to sbind to hplip port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_hplip_port" lineno="49894">
<summary>
Make a TCP connection to the hplip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_hplip_port" lineno="49911">
<summary>
Do not audit attempts to make a TCP connection to hplip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_hplip_client_packets" lineno="49931">
<summary>
Send hplip_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_hplip_client_packets" lineno="49950">
<summary>
Do not audit attempts to send hplip_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_hplip_client_packets" lineno="49969">
<summary>
Receive hplip_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_hplip_client_packets" lineno="49988">
<summary>
Do not audit attempts to receive hplip_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_hplip_client_packets" lineno="50007">
<summary>
Send and receive hplip_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_hplip_client_packets" lineno="50023">
<summary>
Do not audit attempts to send and receive hplip_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_hplip_client_packets" lineno="50038">
<summary>
Relabel packets to hplip_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_hplip_server_packets" lineno="50058">
<summary>
Send hplip_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_hplip_server_packets" lineno="50077">
<summary>
Do not audit attempts to send hplip_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_hplip_server_packets" lineno="50096">
<summary>
Receive hplip_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_hplip_server_packets" lineno="50115">
<summary>
Do not audit attempts to receive hplip_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_hplip_server_packets" lineno="50134">
<summary>
Send and receive hplip_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_hplip_server_packets" lineno="50150">
<summary>
Do not audit attempts to send and receive hplip_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_hplip_server_packets" lineno="50165">
<summary>
Relabel packets to hplip_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_http_port" lineno="50187">
<summary>
Send and receive TCP traffic on the http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_http_port" lineno="50206">
<summary>
Send UDP traffic on the http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_http_port" lineno="50225">
<summary>
Do not audit attempts to send UDP traffic on the http port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_http_port" lineno="50244">
<summary>
Receive UDP traffic on the http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_http_port" lineno="50263">
<summary>
Do not audit attempts to receive UDP traffic on the http port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_http_port" lineno="50282">
<summary>
Send and receive UDP traffic on the http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_http_port" lineno="50299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the http port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_http_port" lineno="50315">
<summary>
Bind TCP sockets to the http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_http_port" lineno="50335">
<summary>
Bind UDP sockets to the http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_http_port" lineno="50355">
<summary>
Do not audit attempts to sbind to http port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_http_port" lineno="50374">
<summary>
Make a TCP connection to the http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_http_port" lineno="50391">
<summary>
Do not audit attempts to make a TCP connection to http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_http_client_packets" lineno="50411">
<summary>
Send http_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_http_client_packets" lineno="50430">
<summary>
Do not audit attempts to send http_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_http_client_packets" lineno="50449">
<summary>
Receive http_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_http_client_packets" lineno="50468">
<summary>
Do not audit attempts to receive http_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_http_client_packets" lineno="50487">
<summary>
Send and receive http_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_http_client_packets" lineno="50503">
<summary>
Do not audit attempts to send and receive http_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_http_client_packets" lineno="50518">
<summary>
Relabel packets to http_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_http_server_packets" lineno="50538">
<summary>
Send http_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_http_server_packets" lineno="50557">
<summary>
Do not audit attempts to send http_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_http_server_packets" lineno="50576">
<summary>
Receive http_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_http_server_packets" lineno="50595">
<summary>
Do not audit attempts to receive http_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_http_server_packets" lineno="50614">
<summary>
Send and receive http_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_http_server_packets" lineno="50630">
<summary>
Do not audit attempts to send and receive http_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_http_server_packets" lineno="50645">
<summary>
Relabel packets to http_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_http_cache_port" lineno="50667">
<summary>
Send and receive TCP traffic on the http_cache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_http_cache_port" lineno="50686">
<summary>
Send UDP traffic on the http_cache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_http_cache_port" lineno="50705">
<summary>
Do not audit attempts to send UDP traffic on the http_cache port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_http_cache_port" lineno="50724">
<summary>
Receive UDP traffic on the http_cache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_http_cache_port" lineno="50743">
<summary>
Do not audit attempts to receive UDP traffic on the http_cache port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_http_cache_port" lineno="50762">
<summary>
Send and receive UDP traffic on the http_cache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_http_cache_port" lineno="50779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the http_cache port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_http_cache_port" lineno="50795">
<summary>
Bind TCP sockets to the http_cache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_http_cache_port" lineno="50815">
<summary>
Bind UDP sockets to the http_cache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_http_cache_port" lineno="50835">
<summary>
Do not audit attempts to sbind to http_cache port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_http_cache_port" lineno="50854">
<summary>
Make a TCP connection to the http_cache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_http_cache_port" lineno="50871">
<summary>
Do not audit attempts to make a TCP connection to http_cache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_http_cache_client_packets" lineno="50891">
<summary>
Send http_cache_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_http_cache_client_packets" lineno="50910">
<summary>
Do not audit attempts to send http_cache_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_http_cache_client_packets" lineno="50929">
<summary>
Receive http_cache_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_http_cache_client_packets" lineno="50948">
<summary>
Do not audit attempts to receive http_cache_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_http_cache_client_packets" lineno="50967">
<summary>
Send and receive http_cache_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_http_cache_client_packets" lineno="50983">
<summary>
Do not audit attempts to send and receive http_cache_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_http_cache_client_packets" lineno="50998">
<summary>
Relabel packets to http_cache_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_http_cache_server_packets" lineno="51018">
<summary>
Send http_cache_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_http_cache_server_packets" lineno="51037">
<summary>
Do not audit attempts to send http_cache_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_http_cache_server_packets" lineno="51056">
<summary>
Receive http_cache_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_http_cache_server_packets" lineno="51075">
<summary>
Do not audit attempts to receive http_cache_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_http_cache_server_packets" lineno="51094">
<summary>
Send and receive http_cache_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_http_cache_server_packets" lineno="51110">
<summary>
Do not audit attempts to send and receive http_cache_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_http_cache_server_packets" lineno="51125">
<summary>
Relabel packets to http_cache_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ibm_dt_2_port" lineno="51147">
<summary>
Send and receive TCP traffic on the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ibm_dt_2_port" lineno="51166">
<summary>
Send UDP traffic on the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ibm_dt_2_port" lineno="51185">
<summary>
Do not audit attempts to send UDP traffic on the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ibm_dt_2_port" lineno="51204">
<summary>
Receive UDP traffic on the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ibm_dt_2_port" lineno="51223">
<summary>
Do not audit attempts to receive UDP traffic on the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ibm_dt_2_port" lineno="51242">
<summary>
Send and receive UDP traffic on the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ibm_dt_2_port" lineno="51259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ibm_dt_2_port" lineno="51275">
<summary>
Bind TCP sockets to the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ibm_dt_2_port" lineno="51295">
<summary>
Bind UDP sockets to the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ibm_dt_2_port" lineno="51315">
<summary>
Do not audit attempts to sbind to ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ibm_dt_2_port" lineno="51334">
<summary>
Make a TCP connection to the ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ibm_dt_2_port" lineno="51351">
<summary>
Do not audit attempts to make a TCP connection to ibm_dt_2 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ibm_dt_2_client_packets" lineno="51371">
<summary>
Send ibm_dt_2_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ibm_dt_2_client_packets" lineno="51390">
<summary>
Do not audit attempts to send ibm_dt_2_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ibm_dt_2_client_packets" lineno="51409">
<summary>
Receive ibm_dt_2_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ibm_dt_2_client_packets" lineno="51428">
<summary>
Do not audit attempts to receive ibm_dt_2_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ibm_dt_2_client_packets" lineno="51447">
<summary>
Send and receive ibm_dt_2_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ibm_dt_2_client_packets" lineno="51463">
<summary>
Do not audit attempts to send and receive ibm_dt_2_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ibm_dt_2_client_packets" lineno="51478">
<summary>
Relabel packets to ibm_dt_2_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ibm_dt_2_server_packets" lineno="51498">
<summary>
Send ibm_dt_2_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ibm_dt_2_server_packets" lineno="51517">
<summary>
Do not audit attempts to send ibm_dt_2_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ibm_dt_2_server_packets" lineno="51536">
<summary>
Receive ibm_dt_2_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ibm_dt_2_server_packets" lineno="51555">
<summary>
Do not audit attempts to receive ibm_dt_2_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ibm_dt_2_server_packets" lineno="51574">
<summary>
Send and receive ibm_dt_2_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ibm_dt_2_server_packets" lineno="51590">
<summary>
Do not audit attempts to send and receive ibm_dt_2_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ibm_dt_2_server_packets" lineno="51605">
<summary>
Relabel packets to ibm_dt_2_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_intermapper_port" lineno="51627">
<summary>
Send and receive TCP traffic on the intermapper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_intermapper_port" lineno="51646">
<summary>
Send UDP traffic on the intermapper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_intermapper_port" lineno="51665">
<summary>
Do not audit attempts to send UDP traffic on the intermapper port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_intermapper_port" lineno="51684">
<summary>
Receive UDP traffic on the intermapper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_intermapper_port" lineno="51703">
<summary>
Do not audit attempts to receive UDP traffic on the intermapper port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_intermapper_port" lineno="51722">
<summary>
Send and receive UDP traffic on the intermapper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_intermapper_port" lineno="51739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the intermapper port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_intermapper_port" lineno="51755">
<summary>
Bind TCP sockets to the intermapper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_intermapper_port" lineno="51775">
<summary>
Bind UDP sockets to the intermapper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_intermapper_port" lineno="51795">
<summary>
Do not audit attempts to sbind to intermapper port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_intermapper_port" lineno="51814">
<summary>
Make a TCP connection to the intermapper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_intermapper_port" lineno="51831">
<summary>
Do not audit attempts to make a TCP connection to intermapper port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_intermapper_client_packets" lineno="51851">
<summary>
Send intermapper_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_intermapper_client_packets" lineno="51870">
<summary>
Do not audit attempts to send intermapper_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_intermapper_client_packets" lineno="51889">
<summary>
Receive intermapper_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_intermapper_client_packets" lineno="51908">
<summary>
Do not audit attempts to receive intermapper_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_intermapper_client_packets" lineno="51927">
<summary>
Send and receive intermapper_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_intermapper_client_packets" lineno="51943">
<summary>
Do not audit attempts to send and receive intermapper_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_intermapper_client_packets" lineno="51958">
<summary>
Relabel packets to intermapper_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_intermapper_server_packets" lineno="51978">
<summary>
Send intermapper_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_intermapper_server_packets" lineno="51997">
<summary>
Do not audit attempts to send intermapper_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_intermapper_server_packets" lineno="52016">
<summary>
Receive intermapper_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_intermapper_server_packets" lineno="52035">
<summary>
Do not audit attempts to receive intermapper_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_intermapper_server_packets" lineno="52054">
<summary>
Send and receive intermapper_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_intermapper_server_packets" lineno="52070">
<summary>
Do not audit attempts to send and receive intermapper_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_intermapper_server_packets" lineno="52085">
<summary>
Relabel packets to intermapper_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_i18n_input_port" lineno="52107">
<summary>
Send and receive TCP traffic on the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_i18n_input_port" lineno="52126">
<summary>
Send UDP traffic on the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_i18n_input_port" lineno="52145">
<summary>
Do not audit attempts to send UDP traffic on the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_i18n_input_port" lineno="52164">
<summary>
Receive UDP traffic on the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_i18n_input_port" lineno="52183">
<summary>
Do not audit attempts to receive UDP traffic on the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_i18n_input_port" lineno="52202">
<summary>
Send and receive UDP traffic on the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_i18n_input_port" lineno="52219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_i18n_input_port" lineno="52235">
<summary>
Bind TCP sockets to the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_i18n_input_port" lineno="52255">
<summary>
Bind UDP sockets to the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_i18n_input_port" lineno="52275">
<summary>
Do not audit attempts to sbind to i18n_input port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_i18n_input_port" lineno="52294">
<summary>
Make a TCP connection to the i18n_input port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_i18n_input_port" lineno="52311">
<summary>
Do not audit attempts to make a TCP connection to i18n_input port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_i18n_input_client_packets" lineno="52331">
<summary>
Send i18n_input_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_i18n_input_client_packets" lineno="52350">
<summary>
Do not audit attempts to send i18n_input_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_i18n_input_client_packets" lineno="52369">
<summary>
Receive i18n_input_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_i18n_input_client_packets" lineno="52388">
<summary>
Do not audit attempts to receive i18n_input_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_i18n_input_client_packets" lineno="52407">
<summary>
Send and receive i18n_input_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_i18n_input_client_packets" lineno="52423">
<summary>
Do not audit attempts to send and receive i18n_input_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_i18n_input_client_packets" lineno="52438">
<summary>
Relabel packets to i18n_input_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_i18n_input_server_packets" lineno="52458">
<summary>
Send i18n_input_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_i18n_input_server_packets" lineno="52477">
<summary>
Do not audit attempts to send i18n_input_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_i18n_input_server_packets" lineno="52496">
<summary>
Receive i18n_input_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_i18n_input_server_packets" lineno="52515">
<summary>
Do not audit attempts to receive i18n_input_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_i18n_input_server_packets" lineno="52534">
<summary>
Send and receive i18n_input_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_i18n_input_server_packets" lineno="52550">
<summary>
Do not audit attempts to send and receive i18n_input_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_i18n_input_server_packets" lineno="52565">
<summary>
Relabel packets to i18n_input_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_imaze_port" lineno="52587">
<summary>
Send and receive TCP traffic on the imaze port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_imaze_port" lineno="52606">
<summary>
Send UDP traffic on the imaze port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_imaze_port" lineno="52625">
<summary>
Do not audit attempts to send UDP traffic on the imaze port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_imaze_port" lineno="52644">
<summary>
Receive UDP traffic on the imaze port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_imaze_port" lineno="52663">
<summary>
Do not audit attempts to receive UDP traffic on the imaze port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_imaze_port" lineno="52682">
<summary>
Send and receive UDP traffic on the imaze port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_imaze_port" lineno="52699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the imaze port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_imaze_port" lineno="52715">
<summary>
Bind TCP sockets to the imaze port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_imaze_port" lineno="52735">
<summary>
Bind UDP sockets to the imaze port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_imaze_port" lineno="52755">
<summary>
Do not audit attempts to sbind to imaze port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_imaze_port" lineno="52774">
<summary>
Make a TCP connection to the imaze port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_imaze_port" lineno="52791">
<summary>
Do not audit attempts to make a TCP connection to imaze port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_imaze_client_packets" lineno="52811">
<summary>
Send imaze_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_imaze_client_packets" lineno="52830">
<summary>
Do not audit attempts to send imaze_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_imaze_client_packets" lineno="52849">
<summary>
Receive imaze_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_imaze_client_packets" lineno="52868">
<summary>
Do not audit attempts to receive imaze_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_imaze_client_packets" lineno="52887">
<summary>
Send and receive imaze_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_imaze_client_packets" lineno="52903">
<summary>
Do not audit attempts to send and receive imaze_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_imaze_client_packets" lineno="52918">
<summary>
Relabel packets to imaze_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_imaze_server_packets" lineno="52938">
<summary>
Send imaze_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_imaze_server_packets" lineno="52957">
<summary>
Do not audit attempts to send imaze_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_imaze_server_packets" lineno="52976">
<summary>
Receive imaze_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_imaze_server_packets" lineno="52995">
<summary>
Do not audit attempts to receive imaze_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_imaze_server_packets" lineno="53014">
<summary>
Send and receive imaze_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_imaze_server_packets" lineno="53030">
<summary>
Do not audit attempts to send and receive imaze_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_imaze_server_packets" lineno="53045">
<summary>
Relabel packets to imaze_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_inetd_child_port" lineno="53067">
<summary>
Send and receive TCP traffic on the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_inetd_child_port" lineno="53086">
<summary>
Send UDP traffic on the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_inetd_child_port" lineno="53105">
<summary>
Do not audit attempts to send UDP traffic on the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_inetd_child_port" lineno="53124">
<summary>
Receive UDP traffic on the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_inetd_child_port" lineno="53143">
<summary>
Do not audit attempts to receive UDP traffic on the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_inetd_child_port" lineno="53162">
<summary>
Send and receive UDP traffic on the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_inetd_child_port" lineno="53179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_inetd_child_port" lineno="53195">
<summary>
Bind TCP sockets to the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_inetd_child_port" lineno="53215">
<summary>
Bind UDP sockets to the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_inetd_child_port" lineno="53235">
<summary>
Do not audit attempts to sbind to inetd_child port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_inetd_child_port" lineno="53254">
<summary>
Make a TCP connection to the inetd_child port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_inetd_child_port" lineno="53271">
<summary>
Do not audit attempts to make a TCP connection to inetd_child port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_inetd_child_client_packets" lineno="53291">
<summary>
Send inetd_child_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_inetd_child_client_packets" lineno="53310">
<summary>
Do not audit attempts to send inetd_child_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_inetd_child_client_packets" lineno="53329">
<summary>
Receive inetd_child_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_inetd_child_client_packets" lineno="53348">
<summary>
Do not audit attempts to receive inetd_child_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_inetd_child_client_packets" lineno="53367">
<summary>
Send and receive inetd_child_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_inetd_child_client_packets" lineno="53383">
<summary>
Do not audit attempts to send and receive inetd_child_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_inetd_child_client_packets" lineno="53398">
<summary>
Relabel packets to inetd_child_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_inetd_child_server_packets" lineno="53418">
<summary>
Send inetd_child_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_inetd_child_server_packets" lineno="53437">
<summary>
Do not audit attempts to send inetd_child_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_inetd_child_server_packets" lineno="53456">
<summary>
Receive inetd_child_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_inetd_child_server_packets" lineno="53475">
<summary>
Do not audit attempts to receive inetd_child_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_inetd_child_server_packets" lineno="53494">
<summary>
Send and receive inetd_child_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_inetd_child_server_packets" lineno="53510">
<summary>
Do not audit attempts to send and receive inetd_child_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_inetd_child_server_packets" lineno="53525">
<summary>
Relabel packets to inetd_child_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_innd_port" lineno="53547">
<summary>
Send and receive TCP traffic on the innd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_innd_port" lineno="53566">
<summary>
Send UDP traffic on the innd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_innd_port" lineno="53585">
<summary>
Do not audit attempts to send UDP traffic on the innd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_innd_port" lineno="53604">
<summary>
Receive UDP traffic on the innd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_innd_port" lineno="53623">
<summary>
Do not audit attempts to receive UDP traffic on the innd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_innd_port" lineno="53642">
<summary>
Send and receive UDP traffic on the innd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_innd_port" lineno="53659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the innd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_innd_port" lineno="53675">
<summary>
Bind TCP sockets to the innd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_innd_port" lineno="53695">
<summary>
Bind UDP sockets to the innd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_innd_port" lineno="53715">
<summary>
Do not audit attempts to sbind to innd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_innd_port" lineno="53734">
<summary>
Make a TCP connection to the innd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_innd_port" lineno="53751">
<summary>
Do not audit attempts to make a TCP connection to innd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_innd_client_packets" lineno="53771">
<summary>
Send innd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_innd_client_packets" lineno="53790">
<summary>
Do not audit attempts to send innd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_innd_client_packets" lineno="53809">
<summary>
Receive innd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_innd_client_packets" lineno="53828">
<summary>
Do not audit attempts to receive innd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_innd_client_packets" lineno="53847">
<summary>
Send and receive innd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_innd_client_packets" lineno="53863">
<summary>
Do not audit attempts to send and receive innd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_innd_client_packets" lineno="53878">
<summary>
Relabel packets to innd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_innd_server_packets" lineno="53898">
<summary>
Send innd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_innd_server_packets" lineno="53917">
<summary>
Do not audit attempts to send innd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_innd_server_packets" lineno="53936">
<summary>
Receive innd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_innd_server_packets" lineno="53955">
<summary>
Do not audit attempts to receive innd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_innd_server_packets" lineno="53974">
<summary>
Send and receive innd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_innd_server_packets" lineno="53990">
<summary>
Do not audit attempts to send and receive innd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_innd_server_packets" lineno="54005">
<summary>
Relabel packets to innd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_interwise_port" lineno="54027">
<summary>
Send and receive TCP traffic on the interwise port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_interwise_port" lineno="54046">
<summary>
Send UDP traffic on the interwise port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_interwise_port" lineno="54065">
<summary>
Do not audit attempts to send UDP traffic on the interwise port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_interwise_port" lineno="54084">
<summary>
Receive UDP traffic on the interwise port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_interwise_port" lineno="54103">
<summary>
Do not audit attempts to receive UDP traffic on the interwise port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_interwise_port" lineno="54122">
<summary>
Send and receive UDP traffic on the interwise port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_interwise_port" lineno="54139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the interwise port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_interwise_port" lineno="54155">
<summary>
Bind TCP sockets to the interwise port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_interwise_port" lineno="54175">
<summary>
Bind UDP sockets to the interwise port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_interwise_port" lineno="54195">
<summary>
Do not audit attempts to sbind to interwise port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_interwise_port" lineno="54214">
<summary>
Make a TCP connection to the interwise port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_interwise_port" lineno="54231">
<summary>
Do not audit attempts to make a TCP connection to interwise port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_interwise_client_packets" lineno="54251">
<summary>
Send interwise_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_interwise_client_packets" lineno="54270">
<summary>
Do not audit attempts to send interwise_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_interwise_client_packets" lineno="54289">
<summary>
Receive interwise_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_interwise_client_packets" lineno="54308">
<summary>
Do not audit attempts to receive interwise_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_interwise_client_packets" lineno="54327">
<summary>
Send and receive interwise_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_interwise_client_packets" lineno="54343">
<summary>
Do not audit attempts to send and receive interwise_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_interwise_client_packets" lineno="54358">
<summary>
Relabel packets to interwise_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_interwise_server_packets" lineno="54378">
<summary>
Send interwise_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_interwise_server_packets" lineno="54397">
<summary>
Do not audit attempts to send interwise_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_interwise_server_packets" lineno="54416">
<summary>
Receive interwise_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_interwise_server_packets" lineno="54435">
<summary>
Do not audit attempts to receive interwise_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_interwise_server_packets" lineno="54454">
<summary>
Send and receive interwise_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_interwise_server_packets" lineno="54470">
<summary>
Do not audit attempts to send and receive interwise_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_interwise_server_packets" lineno="54485">
<summary>
Relabel packets to interwise_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ionixnetmon_port" lineno="54507">
<summary>
Send and receive TCP traffic on the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ionixnetmon_port" lineno="54526">
<summary>
Send UDP traffic on the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ionixnetmon_port" lineno="54545">
<summary>
Do not audit attempts to send UDP traffic on the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ionixnetmon_port" lineno="54564">
<summary>
Receive UDP traffic on the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ionixnetmon_port" lineno="54583">
<summary>
Do not audit attempts to receive UDP traffic on the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ionixnetmon_port" lineno="54602">
<summary>
Send and receive UDP traffic on the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ionixnetmon_port" lineno="54619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ionixnetmon_port" lineno="54635">
<summary>
Bind TCP sockets to the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ionixnetmon_port" lineno="54655">
<summary>
Bind UDP sockets to the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ionixnetmon_port" lineno="54675">
<summary>
Do not audit attempts to sbind to ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ionixnetmon_port" lineno="54694">
<summary>
Make a TCP connection to the ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ionixnetmon_port" lineno="54711">
<summary>
Do not audit attempts to make a TCP connection to ionixnetmon port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ionixnetmon_client_packets" lineno="54731">
<summary>
Send ionixnetmon_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ionixnetmon_client_packets" lineno="54750">
<summary>
Do not audit attempts to send ionixnetmon_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ionixnetmon_client_packets" lineno="54769">
<summary>
Receive ionixnetmon_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ionixnetmon_client_packets" lineno="54788">
<summary>
Do not audit attempts to receive ionixnetmon_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ionixnetmon_client_packets" lineno="54807">
<summary>
Send and receive ionixnetmon_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ionixnetmon_client_packets" lineno="54823">
<summary>
Do not audit attempts to send and receive ionixnetmon_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ionixnetmon_client_packets" lineno="54838">
<summary>
Relabel packets to ionixnetmon_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ionixnetmon_server_packets" lineno="54858">
<summary>
Send ionixnetmon_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ionixnetmon_server_packets" lineno="54877">
<summary>
Do not audit attempts to send ionixnetmon_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ionixnetmon_server_packets" lineno="54896">
<summary>
Receive ionixnetmon_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ionixnetmon_server_packets" lineno="54915">
<summary>
Do not audit attempts to receive ionixnetmon_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ionixnetmon_server_packets" lineno="54934">
<summary>
Send and receive ionixnetmon_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ionixnetmon_server_packets" lineno="54950">
<summary>
Do not audit attempts to send and receive ionixnetmon_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ionixnetmon_server_packets" lineno="54965">
<summary>
Relabel packets to ionixnetmon_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ipmi_port" lineno="54987">
<summary>
Send and receive TCP traffic on the ipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ipmi_port" lineno="55006">
<summary>
Send UDP traffic on the ipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ipmi_port" lineno="55025">
<summary>
Do not audit attempts to send UDP traffic on the ipmi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ipmi_port" lineno="55044">
<summary>
Receive UDP traffic on the ipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ipmi_port" lineno="55063">
<summary>
Do not audit attempts to receive UDP traffic on the ipmi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ipmi_port" lineno="55082">
<summary>
Send and receive UDP traffic on the ipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ipmi_port" lineno="55099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipmi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ipmi_port" lineno="55115">
<summary>
Bind TCP sockets to the ipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ipmi_port" lineno="55135">
<summary>
Bind UDP sockets to the ipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ipmi_port" lineno="55155">
<summary>
Do not audit attempts to sbind to ipmi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ipmi_port" lineno="55174">
<summary>
Make a TCP connection to the ipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ipmi_port" lineno="55191">
<summary>
Do not audit attempts to make a TCP connection to ipmi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ipmi_client_packets" lineno="55211">
<summary>
Send ipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ipmi_client_packets" lineno="55230">
<summary>
Do not audit attempts to send ipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ipmi_client_packets" lineno="55249">
<summary>
Receive ipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ipmi_client_packets" lineno="55268">
<summary>
Do not audit attempts to receive ipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ipmi_client_packets" lineno="55287">
<summary>
Send and receive ipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ipmi_client_packets" lineno="55303">
<summary>
Do not audit attempts to send and receive ipmi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ipmi_client_packets" lineno="55318">
<summary>
Relabel packets to ipmi_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ipmi_server_packets" lineno="55338">
<summary>
Send ipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ipmi_server_packets" lineno="55357">
<summary>
Do not audit attempts to send ipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ipmi_server_packets" lineno="55376">
<summary>
Receive ipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ipmi_server_packets" lineno="55395">
<summary>
Do not audit attempts to receive ipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ipmi_server_packets" lineno="55414">
<summary>
Send and receive ipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ipmi_server_packets" lineno="55430">
<summary>
Do not audit attempts to send and receive ipmi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ipmi_server_packets" lineno="55445">
<summary>
Relabel packets to ipmi_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ipp_port" lineno="55467">
<summary>
Send and receive TCP traffic on the ipp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ipp_port" lineno="55486">
<summary>
Send UDP traffic on the ipp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ipp_port" lineno="55505">
<summary>
Do not audit attempts to send UDP traffic on the ipp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ipp_port" lineno="55524">
<summary>
Receive UDP traffic on the ipp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ipp_port" lineno="55543">
<summary>
Do not audit attempts to receive UDP traffic on the ipp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ipp_port" lineno="55562">
<summary>
Send and receive UDP traffic on the ipp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ipp_port" lineno="55579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ipp_port" lineno="55595">
<summary>
Bind TCP sockets to the ipp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ipp_port" lineno="55615">
<summary>
Bind UDP sockets to the ipp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ipp_port" lineno="55635">
<summary>
Do not audit attempts to sbind to ipp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ipp_port" lineno="55654">
<summary>
Make a TCP connection to the ipp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ipp_port" lineno="55671">
<summary>
Do not audit attempts to make a TCP connection to ipp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ipp_client_packets" lineno="55691">
<summary>
Send ipp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ipp_client_packets" lineno="55710">
<summary>
Do not audit attempts to send ipp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ipp_client_packets" lineno="55729">
<summary>
Receive ipp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ipp_client_packets" lineno="55748">
<summary>
Do not audit attempts to receive ipp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ipp_client_packets" lineno="55767">
<summary>
Send and receive ipp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ipp_client_packets" lineno="55783">
<summary>
Do not audit attempts to send and receive ipp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ipp_client_packets" lineno="55798">
<summary>
Relabel packets to ipp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ipp_server_packets" lineno="55818">
<summary>
Send ipp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ipp_server_packets" lineno="55837">
<summary>
Do not audit attempts to send ipp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ipp_server_packets" lineno="55856">
<summary>
Receive ipp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ipp_server_packets" lineno="55875">
<summary>
Do not audit attempts to receive ipp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ipp_server_packets" lineno="55894">
<summary>
Send and receive ipp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ipp_server_packets" lineno="55910">
<summary>
Do not audit attempts to send and receive ipp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ipp_server_packets" lineno="55925">
<summary>
Relabel packets to ipp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ipsecnat_port" lineno="55947">
<summary>
Send and receive TCP traffic on the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ipsecnat_port" lineno="55966">
<summary>
Send UDP traffic on the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ipsecnat_port" lineno="55985">
<summary>
Do not audit attempts to send UDP traffic on the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ipsecnat_port" lineno="56004">
<summary>
Receive UDP traffic on the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ipsecnat_port" lineno="56023">
<summary>
Do not audit attempts to receive UDP traffic on the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ipsecnat_port" lineno="56042">
<summary>
Send and receive UDP traffic on the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ipsecnat_port" lineno="56059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ipsecnat_port" lineno="56075">
<summary>
Bind TCP sockets to the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ipsecnat_port" lineno="56095">
<summary>
Bind UDP sockets to the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ipsecnat_port" lineno="56115">
<summary>
Do not audit attempts to sbind to ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ipsecnat_port" lineno="56134">
<summary>
Make a TCP connection to the ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ipsecnat_port" lineno="56151">
<summary>
Do not audit attempts to make a TCP connection to ipsecnat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ipsecnat_client_packets" lineno="56171">
<summary>
Send ipsecnat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ipsecnat_client_packets" lineno="56190">
<summary>
Do not audit attempts to send ipsecnat_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ipsecnat_client_packets" lineno="56209">
<summary>
Receive ipsecnat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ipsecnat_client_packets" lineno="56228">
<summary>
Do not audit attempts to receive ipsecnat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ipsecnat_client_packets" lineno="56247">
<summary>
Send and receive ipsecnat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ipsecnat_client_packets" lineno="56263">
<summary>
Do not audit attempts to send and receive ipsecnat_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ipsecnat_client_packets" lineno="56278">
<summary>
Relabel packets to ipsecnat_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ipsecnat_server_packets" lineno="56298">
<summary>
Send ipsecnat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ipsecnat_server_packets" lineno="56317">
<summary>
Do not audit attempts to send ipsecnat_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ipsecnat_server_packets" lineno="56336">
<summary>
Receive ipsecnat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ipsecnat_server_packets" lineno="56355">
<summary>
Do not audit attempts to receive ipsecnat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ipsecnat_server_packets" lineno="56374">
<summary>
Send and receive ipsecnat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ipsecnat_server_packets" lineno="56390">
<summary>
Do not audit attempts to send and receive ipsecnat_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ipsecnat_server_packets" lineno="56405">
<summary>
Relabel packets to ipsecnat_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ircd_port" lineno="56427">
<summary>
Send and receive TCP traffic on the ircd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ircd_port" lineno="56446">
<summary>
Send UDP traffic on the ircd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ircd_port" lineno="56465">
<summary>
Do not audit attempts to send UDP traffic on the ircd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ircd_port" lineno="56484">
<summary>
Receive UDP traffic on the ircd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ircd_port" lineno="56503">
<summary>
Do not audit attempts to receive UDP traffic on the ircd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ircd_port" lineno="56522">
<summary>
Send and receive UDP traffic on the ircd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ircd_port" lineno="56539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ircd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ircd_port" lineno="56555">
<summary>
Bind TCP sockets to the ircd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ircd_port" lineno="56575">
<summary>
Bind UDP sockets to the ircd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ircd_port" lineno="56595">
<summary>
Do not audit attempts to sbind to ircd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ircd_port" lineno="56614">
<summary>
Make a TCP connection to the ircd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ircd_port" lineno="56631">
<summary>
Do not audit attempts to make a TCP connection to ircd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ircd_client_packets" lineno="56651">
<summary>
Send ircd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ircd_client_packets" lineno="56670">
<summary>
Do not audit attempts to send ircd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ircd_client_packets" lineno="56689">
<summary>
Receive ircd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ircd_client_packets" lineno="56708">
<summary>
Do not audit attempts to receive ircd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ircd_client_packets" lineno="56727">
<summary>
Send and receive ircd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ircd_client_packets" lineno="56743">
<summary>
Do not audit attempts to send and receive ircd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ircd_client_packets" lineno="56758">
<summary>
Relabel packets to ircd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ircd_server_packets" lineno="56778">
<summary>
Send ircd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ircd_server_packets" lineno="56797">
<summary>
Do not audit attempts to send ircd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ircd_server_packets" lineno="56816">
<summary>
Receive ircd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ircd_server_packets" lineno="56835">
<summary>
Do not audit attempts to receive ircd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ircd_server_packets" lineno="56854">
<summary>
Send and receive ircd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ircd_server_packets" lineno="56870">
<summary>
Do not audit attempts to send and receive ircd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ircd_server_packets" lineno="56885">
<summary>
Relabel packets to ircd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_isakmp_port" lineno="56907">
<summary>
Send and receive TCP traffic on the isakmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_isakmp_port" lineno="56926">
<summary>
Send UDP traffic on the isakmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_isakmp_port" lineno="56945">
<summary>
Do not audit attempts to send UDP traffic on the isakmp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_isakmp_port" lineno="56964">
<summary>
Receive UDP traffic on the isakmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_isakmp_port" lineno="56983">
<summary>
Do not audit attempts to receive UDP traffic on the isakmp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_isakmp_port" lineno="57002">
<summary>
Send and receive UDP traffic on the isakmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_isakmp_port" lineno="57019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the isakmp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_isakmp_port" lineno="57035">
<summary>
Bind TCP sockets to the isakmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_isakmp_port" lineno="57055">
<summary>
Bind UDP sockets to the isakmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_isakmp_port" lineno="57075">
<summary>
Do not audit attempts to sbind to isakmp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_isakmp_port" lineno="57094">
<summary>
Make a TCP connection to the isakmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_isakmp_port" lineno="57111">
<summary>
Do not audit attempts to make a TCP connection to isakmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_isakmp_client_packets" lineno="57131">
<summary>
Send isakmp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_isakmp_client_packets" lineno="57150">
<summary>
Do not audit attempts to send isakmp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_isakmp_client_packets" lineno="57169">
<summary>
Receive isakmp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_isakmp_client_packets" lineno="57188">
<summary>
Do not audit attempts to receive isakmp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_isakmp_client_packets" lineno="57207">
<summary>
Send and receive isakmp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_isakmp_client_packets" lineno="57223">
<summary>
Do not audit attempts to send and receive isakmp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_isakmp_client_packets" lineno="57238">
<summary>
Relabel packets to isakmp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_isakmp_server_packets" lineno="57258">
<summary>
Send isakmp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_isakmp_server_packets" lineno="57277">
<summary>
Do not audit attempts to send isakmp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_isakmp_server_packets" lineno="57296">
<summary>
Receive isakmp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_isakmp_server_packets" lineno="57315">
<summary>
Do not audit attempts to receive isakmp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_isakmp_server_packets" lineno="57334">
<summary>
Send and receive isakmp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_isakmp_server_packets" lineno="57350">
<summary>
Do not audit attempts to send and receive isakmp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_isakmp_server_packets" lineno="57365">
<summary>
Relabel packets to isakmp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_iscsi_port" lineno="57387">
<summary>
Send and receive TCP traffic on the iscsi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_iscsi_port" lineno="57406">
<summary>
Send UDP traffic on the iscsi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_iscsi_port" lineno="57425">
<summary>
Do not audit attempts to send UDP traffic on the iscsi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_iscsi_port" lineno="57444">
<summary>
Receive UDP traffic on the iscsi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_iscsi_port" lineno="57463">
<summary>
Do not audit attempts to receive UDP traffic on the iscsi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_iscsi_port" lineno="57482">
<summary>
Send and receive UDP traffic on the iscsi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_iscsi_port" lineno="57499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the iscsi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_iscsi_port" lineno="57515">
<summary>
Bind TCP sockets to the iscsi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_iscsi_port" lineno="57535">
<summary>
Bind UDP sockets to the iscsi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_iscsi_port" lineno="57555">
<summary>
Do not audit attempts to sbind to iscsi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_iscsi_port" lineno="57574">
<summary>
Make a TCP connection to the iscsi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_iscsi_port" lineno="57591">
<summary>
Do not audit attempts to make a TCP connection to iscsi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_iscsi_client_packets" lineno="57611">
<summary>
Send iscsi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_iscsi_client_packets" lineno="57630">
<summary>
Do not audit attempts to send iscsi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_iscsi_client_packets" lineno="57649">
<summary>
Receive iscsi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_iscsi_client_packets" lineno="57668">
<summary>
Do not audit attempts to receive iscsi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_iscsi_client_packets" lineno="57687">
<summary>
Send and receive iscsi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_iscsi_client_packets" lineno="57703">
<summary>
Do not audit attempts to send and receive iscsi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_iscsi_client_packets" lineno="57718">
<summary>
Relabel packets to iscsi_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_iscsi_server_packets" lineno="57738">
<summary>
Send iscsi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_iscsi_server_packets" lineno="57757">
<summary>
Do not audit attempts to send iscsi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_iscsi_server_packets" lineno="57776">
<summary>
Receive iscsi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_iscsi_server_packets" lineno="57795">
<summary>
Do not audit attempts to receive iscsi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_iscsi_server_packets" lineno="57814">
<summary>
Send and receive iscsi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_iscsi_server_packets" lineno="57830">
<summary>
Do not audit attempts to send and receive iscsi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_iscsi_server_packets" lineno="57845">
<summary>
Relabel packets to iscsi_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_isns_port" lineno="57867">
<summary>
Send and receive TCP traffic on the isns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_isns_port" lineno="57886">
<summary>
Send UDP traffic on the isns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_isns_port" lineno="57905">
<summary>
Do not audit attempts to send UDP traffic on the isns port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_isns_port" lineno="57924">
<summary>
Receive UDP traffic on the isns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_isns_port" lineno="57943">
<summary>
Do not audit attempts to receive UDP traffic on the isns port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_isns_port" lineno="57962">
<summary>
Send and receive UDP traffic on the isns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_isns_port" lineno="57979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the isns port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_isns_port" lineno="57995">
<summary>
Bind TCP sockets to the isns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_isns_port" lineno="58015">
<summary>
Bind UDP sockets to the isns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_isns_port" lineno="58035">
<summary>
Do not audit attempts to sbind to isns port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_isns_port" lineno="58054">
<summary>
Make a TCP connection to the isns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_isns_port" lineno="58071">
<summary>
Do not audit attempts to make a TCP connection to isns port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_isns_client_packets" lineno="58091">
<summary>
Send isns_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_isns_client_packets" lineno="58110">
<summary>
Do not audit attempts to send isns_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_isns_client_packets" lineno="58129">
<summary>
Receive isns_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_isns_client_packets" lineno="58148">
<summary>
Do not audit attempts to receive isns_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_isns_client_packets" lineno="58167">
<summary>
Send and receive isns_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_isns_client_packets" lineno="58183">
<summary>
Do not audit attempts to send and receive isns_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_isns_client_packets" lineno="58198">
<summary>
Relabel packets to isns_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_isns_server_packets" lineno="58218">
<summary>
Send isns_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_isns_server_packets" lineno="58237">
<summary>
Do not audit attempts to send isns_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_isns_server_packets" lineno="58256">
<summary>
Receive isns_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_isns_server_packets" lineno="58275">
<summary>
Do not audit attempts to receive isns_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_isns_server_packets" lineno="58294">
<summary>
Send and receive isns_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_isns_server_packets" lineno="58310">
<summary>
Do not audit attempts to send and receive isns_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_isns_server_packets" lineno="58325">
<summary>
Relabel packets to isns_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_jabber_client_port" lineno="58347">
<summary>
Send and receive TCP traffic on the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_jabber_client_port" lineno="58366">
<summary>
Send UDP traffic on the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_jabber_client_port" lineno="58385">
<summary>
Do not audit attempts to send UDP traffic on the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_jabber_client_port" lineno="58404">
<summary>
Receive UDP traffic on the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_jabber_client_port" lineno="58423">
<summary>
Do not audit attempts to receive UDP traffic on the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_jabber_client_port" lineno="58442">
<summary>
Send and receive UDP traffic on the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_jabber_client_port" lineno="58459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_jabber_client_port" lineno="58475">
<summary>
Bind TCP sockets to the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_jabber_client_port" lineno="58495">
<summary>
Bind UDP sockets to the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_jabber_client_port" lineno="58515">
<summary>
Do not audit attempts to sbind to jabber_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_jabber_client_port" lineno="58534">
<summary>
Make a TCP connection to the jabber_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_jabber_client_port" lineno="58551">
<summary>
Do not audit attempts to make a TCP connection to jabber_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jabber_client_client_packets" lineno="58571">
<summary>
Send jabber_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jabber_client_client_packets" lineno="58590">
<summary>
Do not audit attempts to send jabber_client_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jabber_client_client_packets" lineno="58609">
<summary>
Receive jabber_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jabber_client_client_packets" lineno="58628">
<summary>
Do not audit attempts to receive jabber_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jabber_client_client_packets" lineno="58647">
<summary>
Send and receive jabber_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jabber_client_client_packets" lineno="58663">
<summary>
Do not audit attempts to send and receive jabber_client_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jabber_client_client_packets" lineno="58678">
<summary>
Relabel packets to jabber_client_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jabber_client_server_packets" lineno="58698">
<summary>
Send jabber_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jabber_client_server_packets" lineno="58717">
<summary>
Do not audit attempts to send jabber_client_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jabber_client_server_packets" lineno="58736">
<summary>
Receive jabber_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jabber_client_server_packets" lineno="58755">
<summary>
Do not audit attempts to receive jabber_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jabber_client_server_packets" lineno="58774">
<summary>
Send and receive jabber_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jabber_client_server_packets" lineno="58790">
<summary>
Do not audit attempts to send and receive jabber_client_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jabber_client_server_packets" lineno="58805">
<summary>
Relabel packets to jabber_client_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_jabber_interserver_port" lineno="58827">
<summary>
Send and receive TCP traffic on the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_jabber_interserver_port" lineno="58846">
<summary>
Send UDP traffic on the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_jabber_interserver_port" lineno="58865">
<summary>
Do not audit attempts to send UDP traffic on the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_jabber_interserver_port" lineno="58884">
<summary>
Receive UDP traffic on the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_jabber_interserver_port" lineno="58903">
<summary>
Do not audit attempts to receive UDP traffic on the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_jabber_interserver_port" lineno="58922">
<summary>
Send and receive UDP traffic on the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_jabber_interserver_port" lineno="58939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_jabber_interserver_port" lineno="58955">
<summary>
Bind TCP sockets to the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_jabber_interserver_port" lineno="58975">
<summary>
Bind UDP sockets to the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_jabber_interserver_port" lineno="58995">
<summary>
Do not audit attempts to sbind to jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_jabber_interserver_port" lineno="59014">
<summary>
Make a TCP connection to the jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_jabber_interserver_port" lineno="59031">
<summary>
Do not audit attempts to make a TCP connection to jabber_interserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jabber_interserver_client_packets" lineno="59051">
<summary>
Send jabber_interserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jabber_interserver_client_packets" lineno="59070">
<summary>
Do not audit attempts to send jabber_interserver_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jabber_interserver_client_packets" lineno="59089">
<summary>
Receive jabber_interserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jabber_interserver_client_packets" lineno="59108">
<summary>
Do not audit attempts to receive jabber_interserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jabber_interserver_client_packets" lineno="59127">
<summary>
Send and receive jabber_interserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jabber_interserver_client_packets" lineno="59143">
<summary>
Do not audit attempts to send and receive jabber_interserver_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jabber_interserver_client_packets" lineno="59158">
<summary>
Relabel packets to jabber_interserver_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jabber_interserver_server_packets" lineno="59178">
<summary>
Send jabber_interserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jabber_interserver_server_packets" lineno="59197">
<summary>
Do not audit attempts to send jabber_interserver_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jabber_interserver_server_packets" lineno="59216">
<summary>
Receive jabber_interserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jabber_interserver_server_packets" lineno="59235">
<summary>
Do not audit attempts to receive jabber_interserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jabber_interserver_server_packets" lineno="59254">
<summary>
Send and receive jabber_interserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jabber_interserver_server_packets" lineno="59270">
<summary>
Do not audit attempts to send and receive jabber_interserver_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jabber_interserver_server_packets" lineno="59285">
<summary>
Relabel packets to jabber_interserver_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_jabber_router_port" lineno="59307">
<summary>
Send and receive TCP traffic on the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_jabber_router_port" lineno="59326">
<summary>
Send UDP traffic on the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_jabber_router_port" lineno="59345">
<summary>
Do not audit attempts to send UDP traffic on the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_jabber_router_port" lineno="59364">
<summary>
Receive UDP traffic on the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_jabber_router_port" lineno="59383">
<summary>
Do not audit attempts to receive UDP traffic on the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_jabber_router_port" lineno="59402">
<summary>
Send and receive UDP traffic on the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_jabber_router_port" lineno="59419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_jabber_router_port" lineno="59435">
<summary>
Bind TCP sockets to the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_jabber_router_port" lineno="59455">
<summary>
Bind UDP sockets to the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_jabber_router_port" lineno="59475">
<summary>
Do not audit attempts to sbind to jabber_router port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_jabber_router_port" lineno="59494">
<summary>
Make a TCP connection to the jabber_router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_jabber_router_port" lineno="59511">
<summary>
Do not audit attempts to make a TCP connection to jabber_router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jabber_router_client_packets" lineno="59531">
<summary>
Send jabber_router_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jabber_router_client_packets" lineno="59550">
<summary>
Do not audit attempts to send jabber_router_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jabber_router_client_packets" lineno="59569">
<summary>
Receive jabber_router_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jabber_router_client_packets" lineno="59588">
<summary>
Do not audit attempts to receive jabber_router_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jabber_router_client_packets" lineno="59607">
<summary>
Send and receive jabber_router_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jabber_router_client_packets" lineno="59623">
<summary>
Do not audit attempts to send and receive jabber_router_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jabber_router_client_packets" lineno="59638">
<summary>
Relabel packets to jabber_router_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jabber_router_server_packets" lineno="59658">
<summary>
Send jabber_router_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jabber_router_server_packets" lineno="59677">
<summary>
Do not audit attempts to send jabber_router_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jabber_router_server_packets" lineno="59696">
<summary>
Receive jabber_router_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jabber_router_server_packets" lineno="59715">
<summary>
Do not audit attempts to receive jabber_router_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jabber_router_server_packets" lineno="59734">
<summary>
Send and receive jabber_router_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jabber_router_server_packets" lineno="59750">
<summary>
Do not audit attempts to send and receive jabber_router_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jabber_router_server_packets" lineno="59765">
<summary>
Relabel packets to jabber_router_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_jacorb_port" lineno="59787">
<summary>
Send and receive TCP traffic on the jacorb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_jacorb_port" lineno="59806">
<summary>
Send UDP traffic on the jacorb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_jacorb_port" lineno="59825">
<summary>
Do not audit attempts to send UDP traffic on the jacorb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_jacorb_port" lineno="59844">
<summary>
Receive UDP traffic on the jacorb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_jacorb_port" lineno="59863">
<summary>
Do not audit attempts to receive UDP traffic on the jacorb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_jacorb_port" lineno="59882">
<summary>
Send and receive UDP traffic on the jacorb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_jacorb_port" lineno="59899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jacorb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_jacorb_port" lineno="59915">
<summary>
Bind TCP sockets to the jacorb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_jacorb_port" lineno="59935">
<summary>
Bind UDP sockets to the jacorb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_jacorb_port" lineno="59955">
<summary>
Do not audit attempts to sbind to jacorb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_jacorb_port" lineno="59974">
<summary>
Make a TCP connection to the jacorb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_jacorb_port" lineno="59991">
<summary>
Do not audit attempts to make a TCP connection to jacorb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jacorb_client_packets" lineno="60011">
<summary>
Send jacorb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jacorb_client_packets" lineno="60030">
<summary>
Do not audit attempts to send jacorb_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jacorb_client_packets" lineno="60049">
<summary>
Receive jacorb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jacorb_client_packets" lineno="60068">
<summary>
Do not audit attempts to receive jacorb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jacorb_client_packets" lineno="60087">
<summary>
Send and receive jacorb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jacorb_client_packets" lineno="60103">
<summary>
Do not audit attempts to send and receive jacorb_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jacorb_client_packets" lineno="60118">
<summary>
Relabel packets to jacorb_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jacorb_server_packets" lineno="60138">
<summary>
Send jacorb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jacorb_server_packets" lineno="60157">
<summary>
Do not audit attempts to send jacorb_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jacorb_server_packets" lineno="60176">
<summary>
Receive jacorb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jacorb_server_packets" lineno="60195">
<summary>
Do not audit attempts to receive jacorb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jacorb_server_packets" lineno="60214">
<summary>
Send and receive jacorb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jacorb_server_packets" lineno="60230">
<summary>
Do not audit attempts to send and receive jacorb_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jacorb_server_packets" lineno="60245">
<summary>
Relabel packets to jacorb_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_jboss_debug_port" lineno="60267">
<summary>
Send and receive TCP traffic on the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_jboss_debug_port" lineno="60286">
<summary>
Send UDP traffic on the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_jboss_debug_port" lineno="60305">
<summary>
Do not audit attempts to send UDP traffic on the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_jboss_debug_port" lineno="60324">
<summary>
Receive UDP traffic on the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_jboss_debug_port" lineno="60343">
<summary>
Do not audit attempts to receive UDP traffic on the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_jboss_debug_port" lineno="60362">
<summary>
Send and receive UDP traffic on the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_jboss_debug_port" lineno="60379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_jboss_debug_port" lineno="60395">
<summary>
Bind TCP sockets to the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_jboss_debug_port" lineno="60415">
<summary>
Bind UDP sockets to the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_jboss_debug_port" lineno="60435">
<summary>
Do not audit attempts to sbind to jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_jboss_debug_port" lineno="60454">
<summary>
Make a TCP connection to the jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_jboss_debug_port" lineno="60471">
<summary>
Do not audit attempts to make a TCP connection to jboss_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jboss_debug_client_packets" lineno="60491">
<summary>
Send jboss_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jboss_debug_client_packets" lineno="60510">
<summary>
Do not audit attempts to send jboss_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jboss_debug_client_packets" lineno="60529">
<summary>
Receive jboss_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jboss_debug_client_packets" lineno="60548">
<summary>
Do not audit attempts to receive jboss_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jboss_debug_client_packets" lineno="60567">
<summary>
Send and receive jboss_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jboss_debug_client_packets" lineno="60583">
<summary>
Do not audit attempts to send and receive jboss_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jboss_debug_client_packets" lineno="60598">
<summary>
Relabel packets to jboss_debug_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jboss_debug_server_packets" lineno="60618">
<summary>
Send jboss_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jboss_debug_server_packets" lineno="60637">
<summary>
Do not audit attempts to send jboss_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jboss_debug_server_packets" lineno="60656">
<summary>
Receive jboss_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jboss_debug_server_packets" lineno="60675">
<summary>
Do not audit attempts to receive jboss_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jboss_debug_server_packets" lineno="60694">
<summary>
Send and receive jboss_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jboss_debug_server_packets" lineno="60710">
<summary>
Do not audit attempts to send and receive jboss_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jboss_debug_server_packets" lineno="60725">
<summary>
Relabel packets to jboss_debug_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_jboss_messaging_port" lineno="60747">
<summary>
Send and receive TCP traffic on the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_jboss_messaging_port" lineno="60766">
<summary>
Send UDP traffic on the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_jboss_messaging_port" lineno="60785">
<summary>
Do not audit attempts to send UDP traffic on the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_jboss_messaging_port" lineno="60804">
<summary>
Receive UDP traffic on the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_jboss_messaging_port" lineno="60823">
<summary>
Do not audit attempts to receive UDP traffic on the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_jboss_messaging_port" lineno="60842">
<summary>
Send and receive UDP traffic on the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_jboss_messaging_port" lineno="60859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_jboss_messaging_port" lineno="60875">
<summary>
Bind TCP sockets to the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_jboss_messaging_port" lineno="60895">
<summary>
Bind UDP sockets to the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_jboss_messaging_port" lineno="60915">
<summary>
Do not audit attempts to sbind to jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_jboss_messaging_port" lineno="60934">
<summary>
Make a TCP connection to the jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_jboss_messaging_port" lineno="60951">
<summary>
Do not audit attempts to make a TCP connection to jboss_messaging port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jboss_messaging_client_packets" lineno="60971">
<summary>
Send jboss_messaging_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jboss_messaging_client_packets" lineno="60990">
<summary>
Do not audit attempts to send jboss_messaging_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jboss_messaging_client_packets" lineno="61009">
<summary>
Receive jboss_messaging_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jboss_messaging_client_packets" lineno="61028">
<summary>
Do not audit attempts to receive jboss_messaging_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jboss_messaging_client_packets" lineno="61047">
<summary>
Send and receive jboss_messaging_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jboss_messaging_client_packets" lineno="61063">
<summary>
Do not audit attempts to send and receive jboss_messaging_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jboss_messaging_client_packets" lineno="61078">
<summary>
Relabel packets to jboss_messaging_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jboss_messaging_server_packets" lineno="61098">
<summary>
Send jboss_messaging_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jboss_messaging_server_packets" lineno="61117">
<summary>
Do not audit attempts to send jboss_messaging_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jboss_messaging_server_packets" lineno="61136">
<summary>
Receive jboss_messaging_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jboss_messaging_server_packets" lineno="61155">
<summary>
Do not audit attempts to receive jboss_messaging_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jboss_messaging_server_packets" lineno="61174">
<summary>
Send and receive jboss_messaging_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jboss_messaging_server_packets" lineno="61190">
<summary>
Do not audit attempts to send and receive jboss_messaging_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jboss_messaging_server_packets" lineno="61205">
<summary>
Relabel packets to jboss_messaging_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_jboss_management_port" lineno="61227">
<summary>
Send and receive TCP traffic on the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_jboss_management_port" lineno="61246">
<summary>
Send UDP traffic on the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_jboss_management_port" lineno="61265">
<summary>
Do not audit attempts to send UDP traffic on the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_jboss_management_port" lineno="61284">
<summary>
Receive UDP traffic on the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_jboss_management_port" lineno="61303">
<summary>
Do not audit attempts to receive UDP traffic on the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_jboss_management_port" lineno="61322">
<summary>
Send and receive UDP traffic on the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_jboss_management_port" lineno="61339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_jboss_management_port" lineno="61355">
<summary>
Bind TCP sockets to the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_jboss_management_port" lineno="61375">
<summary>
Bind UDP sockets to the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_jboss_management_port" lineno="61395">
<summary>
Do not audit attempts to sbind to jboss_management port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_jboss_management_port" lineno="61414">
<summary>
Make a TCP connection to the jboss_management port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_jboss_management_port" lineno="61431">
<summary>
Do not audit attempts to make a TCP connection to jboss_management port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jboss_management_client_packets" lineno="61451">
<summary>
Send jboss_management_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jboss_management_client_packets" lineno="61470">
<summary>
Do not audit attempts to send jboss_management_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jboss_management_client_packets" lineno="61489">
<summary>
Receive jboss_management_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jboss_management_client_packets" lineno="61508">
<summary>
Do not audit attempts to receive jboss_management_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jboss_management_client_packets" lineno="61527">
<summary>
Send and receive jboss_management_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jboss_management_client_packets" lineno="61543">
<summary>
Do not audit attempts to send and receive jboss_management_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jboss_management_client_packets" lineno="61558">
<summary>
Relabel packets to jboss_management_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_jboss_management_server_packets" lineno="61578">
<summary>
Send jboss_management_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_jboss_management_server_packets" lineno="61597">
<summary>
Do not audit attempts to send jboss_management_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_jboss_management_server_packets" lineno="61616">
<summary>
Receive jboss_management_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_jboss_management_server_packets" lineno="61635">
<summary>
Do not audit attempts to receive jboss_management_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_jboss_management_server_packets" lineno="61654">
<summary>
Send and receive jboss_management_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_jboss_management_server_packets" lineno="61670">
<summary>
Do not audit attempts to send and receive jboss_management_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_jboss_management_server_packets" lineno="61685">
<summary>
Relabel packets to jboss_management_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_journal_remote_port" lineno="61707">
<summary>
Send and receive TCP traffic on the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_journal_remote_port" lineno="61726">
<summary>
Send UDP traffic on the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_journal_remote_port" lineno="61745">
<summary>
Do not audit attempts to send UDP traffic on the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_journal_remote_port" lineno="61764">
<summary>
Receive UDP traffic on the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_journal_remote_port" lineno="61783">
<summary>
Do not audit attempts to receive UDP traffic on the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_journal_remote_port" lineno="61802">
<summary>
Send and receive UDP traffic on the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_journal_remote_port" lineno="61819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_journal_remote_port" lineno="61835">
<summary>
Bind TCP sockets to the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_journal_remote_port" lineno="61855">
<summary>
Bind UDP sockets to the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_journal_remote_port" lineno="61875">
<summary>
Do not audit attempts to sbind to journal_remote port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_journal_remote_port" lineno="61894">
<summary>
Make a TCP connection to the journal_remote port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_journal_remote_port" lineno="61911">
<summary>
Do not audit attempts to make a TCP connection to journal_remote port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_journal_remote_client_packets" lineno="61931">
<summary>
Send journal_remote_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_journal_remote_client_packets" lineno="61950">
<summary>
Do not audit attempts to send journal_remote_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_journal_remote_client_packets" lineno="61969">
<summary>
Receive journal_remote_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_journal_remote_client_packets" lineno="61988">
<summary>
Do not audit attempts to receive journal_remote_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_journal_remote_client_packets" lineno="62007">
<summary>
Send and receive journal_remote_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_journal_remote_client_packets" lineno="62023">
<summary>
Do not audit attempts to send and receive journal_remote_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_journal_remote_client_packets" lineno="62038">
<summary>
Relabel packets to journal_remote_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_journal_remote_server_packets" lineno="62058">
<summary>
Send journal_remote_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_journal_remote_server_packets" lineno="62077">
<summary>
Do not audit attempts to send journal_remote_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_journal_remote_server_packets" lineno="62096">
<summary>
Receive journal_remote_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_journal_remote_server_packets" lineno="62115">
<summary>
Do not audit attempts to receive journal_remote_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_journal_remote_server_packets" lineno="62134">
<summary>
Send and receive journal_remote_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_journal_remote_server_packets" lineno="62150">
<summary>
Do not audit attempts to send and receive journal_remote_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_journal_remote_server_packets" lineno="62165">
<summary>
Relabel packets to journal_remote_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_kerberos_port" lineno="62187">
<summary>
Send and receive TCP traffic on the kerberos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_kerberos_port" lineno="62206">
<summary>
Send UDP traffic on the kerberos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_kerberos_port" lineno="62225">
<summary>
Do not audit attempts to send UDP traffic on the kerberos port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_kerberos_port" lineno="62244">
<summary>
Receive UDP traffic on the kerberos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_kerberos_port" lineno="62263">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_kerberos_port" lineno="62282">
<summary>
Send and receive UDP traffic on the kerberos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_kerberos_port" lineno="62299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_kerberos_port" lineno="62315">
<summary>
Bind TCP sockets to the kerberos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_kerberos_port" lineno="62335">
<summary>
Bind UDP sockets to the kerberos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_kerberos_port" lineno="62355">
<summary>
Do not audit attempts to sbind to kerberos port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_kerberos_port" lineno="62374">
<summary>
Make a TCP connection to the kerberos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_kerberos_port" lineno="62391">
<summary>
Do not audit attempts to make a TCP connection to kerberos port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kerberos_client_packets" lineno="62411">
<summary>
Send kerberos_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kerberos_client_packets" lineno="62430">
<summary>
Do not audit attempts to send kerberos_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kerberos_client_packets" lineno="62449">
<summary>
Receive kerberos_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kerberos_client_packets" lineno="62468">
<summary>
Do not audit attempts to receive kerberos_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kerberos_client_packets" lineno="62487">
<summary>
Send and receive kerberos_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kerberos_client_packets" lineno="62503">
<summary>
Do not audit attempts to send and receive kerberos_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kerberos_client_packets" lineno="62518">
<summary>
Relabel packets to kerberos_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kerberos_server_packets" lineno="62538">
<summary>
Send kerberos_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kerberos_server_packets" lineno="62557">
<summary>
Do not audit attempts to send kerberos_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kerberos_server_packets" lineno="62576">
<summary>
Receive kerberos_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kerberos_server_packets" lineno="62595">
<summary>
Do not audit attempts to receive kerberos_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kerberos_server_packets" lineno="62614">
<summary>
Send and receive kerberos_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kerberos_server_packets" lineno="62630">
<summary>
Do not audit attempts to send and receive kerberos_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kerberos_server_packets" lineno="62645">
<summary>
Relabel packets to kerberos_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_kerberos_admin_port" lineno="62667">
<summary>
Send and receive TCP traffic on the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_kerberos_admin_port" lineno="62686">
<summary>
Send UDP traffic on the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_kerberos_admin_port" lineno="62705">
<summary>
Do not audit attempts to send UDP traffic on the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_kerberos_admin_port" lineno="62724">
<summary>
Receive UDP traffic on the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_kerberos_admin_port" lineno="62743">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_kerberos_admin_port" lineno="62762">
<summary>
Send and receive UDP traffic on the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_kerberos_admin_port" lineno="62779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_kerberos_admin_port" lineno="62795">
<summary>
Bind TCP sockets to the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_kerberos_admin_port" lineno="62815">
<summary>
Bind UDP sockets to the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_kerberos_admin_port" lineno="62835">
<summary>
Do not audit attempts to sbind to kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_kerberos_admin_port" lineno="62854">
<summary>
Make a TCP connection to the kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_kerberos_admin_port" lineno="62871">
<summary>
Do not audit attempts to make a TCP connection to kerberos_admin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kerberos_admin_client_packets" lineno="62891">
<summary>
Send kerberos_admin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kerberos_admin_client_packets" lineno="62910">
<summary>
Do not audit attempts to send kerberos_admin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kerberos_admin_client_packets" lineno="62929">
<summary>
Receive kerberos_admin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kerberos_admin_client_packets" lineno="62948">
<summary>
Do not audit attempts to receive kerberos_admin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kerberos_admin_client_packets" lineno="62967">
<summary>
Send and receive kerberos_admin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kerberos_admin_client_packets" lineno="62983">
<summary>
Do not audit attempts to send and receive kerberos_admin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kerberos_admin_client_packets" lineno="62998">
<summary>
Relabel packets to kerberos_admin_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kerberos_admin_server_packets" lineno="63018">
<summary>
Send kerberos_admin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kerberos_admin_server_packets" lineno="63037">
<summary>
Do not audit attempts to send kerberos_admin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kerberos_admin_server_packets" lineno="63056">
<summary>
Receive kerberos_admin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kerberos_admin_server_packets" lineno="63075">
<summary>
Do not audit attempts to receive kerberos_admin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kerberos_admin_server_packets" lineno="63094">
<summary>
Send and receive kerberos_admin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kerberos_admin_server_packets" lineno="63110">
<summary>
Do not audit attempts to send and receive kerberos_admin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kerberos_admin_server_packets" lineno="63125">
<summary>
Relabel packets to kerberos_admin_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_kerberos_password_port" lineno="63147">
<summary>
Send and receive TCP traffic on the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_kerberos_password_port" lineno="63166">
<summary>
Send UDP traffic on the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_kerberos_password_port" lineno="63185">
<summary>
Do not audit attempts to send UDP traffic on the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_kerberos_password_port" lineno="63204">
<summary>
Receive UDP traffic on the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_kerberos_password_port" lineno="63223">
<summary>
Do not audit attempts to receive UDP traffic on the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_kerberos_password_port" lineno="63242">
<summary>
Send and receive UDP traffic on the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_kerberos_password_port" lineno="63259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_kerberos_password_port" lineno="63275">
<summary>
Bind TCP sockets to the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_kerberos_password_port" lineno="63295">
<summary>
Bind UDP sockets to the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_kerberos_password_port" lineno="63315">
<summary>
Do not audit attempts to sbind to kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_kerberos_password_port" lineno="63334">
<summary>
Make a TCP connection to the kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_kerberos_password_port" lineno="63351">
<summary>
Do not audit attempts to make a TCP connection to kerberos_password port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kerberos_password_client_packets" lineno="63371">
<summary>
Send kerberos_password_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kerberos_password_client_packets" lineno="63390">
<summary>
Do not audit attempts to send kerberos_password_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kerberos_password_client_packets" lineno="63409">
<summary>
Receive kerberos_password_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kerberos_password_client_packets" lineno="63428">
<summary>
Do not audit attempts to receive kerberos_password_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kerberos_password_client_packets" lineno="63447">
<summary>
Send and receive kerberos_password_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kerberos_password_client_packets" lineno="63463">
<summary>
Do not audit attempts to send and receive kerberos_password_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kerberos_password_client_packets" lineno="63478">
<summary>
Relabel packets to kerberos_password_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kerberos_password_server_packets" lineno="63498">
<summary>
Send kerberos_password_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kerberos_password_server_packets" lineno="63517">
<summary>
Do not audit attempts to send kerberos_password_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kerberos_password_server_packets" lineno="63536">
<summary>
Receive kerberos_password_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kerberos_password_server_packets" lineno="63555">
<summary>
Do not audit attempts to receive kerberos_password_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kerberos_password_server_packets" lineno="63574">
<summary>
Send and receive kerberos_password_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kerberos_password_server_packets" lineno="63590">
<summary>
Do not audit attempts to send and receive kerberos_password_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kerberos_password_server_packets" lineno="63605">
<summary>
Relabel packets to kerberos_password_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_keylime_port" lineno="63627">
<summary>
Send and receive TCP traffic on the keylime port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_keylime_port" lineno="63646">
<summary>
Send UDP traffic on the keylime port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_keylime_port" lineno="63665">
<summary>
Do not audit attempts to send UDP traffic on the keylime port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_keylime_port" lineno="63684">
<summary>
Receive UDP traffic on the keylime port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_keylime_port" lineno="63703">
<summary>
Do not audit attempts to receive UDP traffic on the keylime port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_keylime_port" lineno="63722">
<summary>
Send and receive UDP traffic on the keylime port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_keylime_port" lineno="63739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the keylime port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_keylime_port" lineno="63755">
<summary>
Bind TCP sockets to the keylime port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_keylime_port" lineno="63775">
<summary>
Bind UDP sockets to the keylime port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_keylime_port" lineno="63795">
<summary>
Do not audit attempts to sbind to keylime port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_keylime_port" lineno="63814">
<summary>
Make a TCP connection to the keylime port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_keylime_port" lineno="63831">
<summary>
Do not audit attempts to make a TCP connection to keylime port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_keylime_client_packets" lineno="63851">
<summary>
Send keylime_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_keylime_client_packets" lineno="63870">
<summary>
Do not audit attempts to send keylime_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_keylime_client_packets" lineno="63889">
<summary>
Receive keylime_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_keylime_client_packets" lineno="63908">
<summary>
Do not audit attempts to receive keylime_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_keylime_client_packets" lineno="63927">
<summary>
Send and receive keylime_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_keylime_client_packets" lineno="63943">
<summary>
Do not audit attempts to send and receive keylime_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_keylime_client_packets" lineno="63958">
<summary>
Relabel packets to keylime_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_keylime_server_packets" lineno="63978">
<summary>
Send keylime_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_keylime_server_packets" lineno="63997">
<summary>
Do not audit attempts to send keylime_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_keylime_server_packets" lineno="64016">
<summary>
Receive keylime_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_keylime_server_packets" lineno="64035">
<summary>
Do not audit attempts to receive keylime_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_keylime_server_packets" lineno="64054">
<summary>
Send and receive keylime_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_keylime_server_packets" lineno="64070">
<summary>
Do not audit attempts to send and receive keylime_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_keylime_server_packets" lineno="64085">
<summary>
Relabel packets to keylime_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_keystone_port" lineno="64107">
<summary>
Send and receive TCP traffic on the keystone port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_keystone_port" lineno="64126">
<summary>
Send UDP traffic on the keystone port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_keystone_port" lineno="64145">
<summary>
Do not audit attempts to send UDP traffic on the keystone port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_keystone_port" lineno="64164">
<summary>
Receive UDP traffic on the keystone port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_keystone_port" lineno="64183">
<summary>
Do not audit attempts to receive UDP traffic on the keystone port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_keystone_port" lineno="64202">
<summary>
Send and receive UDP traffic on the keystone port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_keystone_port" lineno="64219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the keystone port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_keystone_port" lineno="64235">
<summary>
Bind TCP sockets to the keystone port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_keystone_port" lineno="64255">
<summary>
Bind UDP sockets to the keystone port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_keystone_port" lineno="64275">
<summary>
Do not audit attempts to sbind to keystone port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_keystone_port" lineno="64294">
<summary>
Make a TCP connection to the keystone port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_keystone_port" lineno="64311">
<summary>
Do not audit attempts to make a TCP connection to keystone port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_keystone_client_packets" lineno="64331">
<summary>
Send keystone_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_keystone_client_packets" lineno="64350">
<summary>
Do not audit attempts to send keystone_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_keystone_client_packets" lineno="64369">
<summary>
Receive keystone_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_keystone_client_packets" lineno="64388">
<summary>
Do not audit attempts to receive keystone_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_keystone_client_packets" lineno="64407">
<summary>
Send and receive keystone_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_keystone_client_packets" lineno="64423">
<summary>
Do not audit attempts to send and receive keystone_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_keystone_client_packets" lineno="64438">
<summary>
Relabel packets to keystone_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_keystone_server_packets" lineno="64458">
<summary>
Send keystone_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_keystone_server_packets" lineno="64477">
<summary>
Do not audit attempts to send keystone_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_keystone_server_packets" lineno="64496">
<summary>
Receive keystone_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_keystone_server_packets" lineno="64515">
<summary>
Do not audit attempts to receive keystone_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_keystone_server_packets" lineno="64534">
<summary>
Send and receive keystone_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_keystone_server_packets" lineno="64550">
<summary>
Do not audit attempts to send and receive keystone_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_keystone_server_packets" lineno="64565">
<summary>
Relabel packets to keystone_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_kubernetes_port" lineno="64587">
<summary>
Send and receive TCP traffic on the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_kubernetes_port" lineno="64606">
<summary>
Send UDP traffic on the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_kubernetes_port" lineno="64625">
<summary>
Do not audit attempts to send UDP traffic on the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_kubernetes_port" lineno="64644">
<summary>
Receive UDP traffic on the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_kubernetes_port" lineno="64663">
<summary>
Do not audit attempts to receive UDP traffic on the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_kubernetes_port" lineno="64682">
<summary>
Send and receive UDP traffic on the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_kubernetes_port" lineno="64699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_kubernetes_port" lineno="64715">
<summary>
Bind TCP sockets to the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_kubernetes_port" lineno="64735">
<summary>
Bind UDP sockets to the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_kubernetes_port" lineno="64755">
<summary>
Do not audit attempts to sbind to kubernetes port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_kubernetes_port" lineno="64774">
<summary>
Make a TCP connection to the kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_kubernetes_port" lineno="64791">
<summary>
Do not audit attempts to make a TCP connection to kubernetes port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kubernetes_client_packets" lineno="64811">
<summary>
Send kubernetes_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kubernetes_client_packets" lineno="64830">
<summary>
Do not audit attempts to send kubernetes_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kubernetes_client_packets" lineno="64849">
<summary>
Receive kubernetes_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kubernetes_client_packets" lineno="64868">
<summary>
Do not audit attempts to receive kubernetes_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kubernetes_client_packets" lineno="64887">
<summary>
Send and receive kubernetes_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kubernetes_client_packets" lineno="64903">
<summary>
Do not audit attempts to send and receive kubernetes_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kubernetes_client_packets" lineno="64918">
<summary>
Relabel packets to kubernetes_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kubernetes_server_packets" lineno="64938">
<summary>
Send kubernetes_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kubernetes_server_packets" lineno="64957">
<summary>
Do not audit attempts to send kubernetes_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kubernetes_server_packets" lineno="64976">
<summary>
Receive kubernetes_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kubernetes_server_packets" lineno="64995">
<summary>
Do not audit attempts to receive kubernetes_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kubernetes_server_packets" lineno="65014">
<summary>
Send and receive kubernetes_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kubernetes_server_packets" lineno="65030">
<summary>
Do not audit attempts to send and receive kubernetes_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kubernetes_server_packets" lineno="65045">
<summary>
Relabel packets to kubernetes_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_lltng_port" lineno="65067">
<summary>
Send and receive TCP traffic on the lltng port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_lltng_port" lineno="65086">
<summary>
Send UDP traffic on the lltng port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_lltng_port" lineno="65105">
<summary>
Do not audit attempts to send UDP traffic on the lltng port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_lltng_port" lineno="65124">
<summary>
Receive UDP traffic on the lltng port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_lltng_port" lineno="65143">
<summary>
Do not audit attempts to receive UDP traffic on the lltng port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_lltng_port" lineno="65162">
<summary>
Send and receive UDP traffic on the lltng port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_lltng_port" lineno="65179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lltng port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_lltng_port" lineno="65195">
<summary>
Bind TCP sockets to the lltng port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_lltng_port" lineno="65215">
<summary>
Bind UDP sockets to the lltng port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_lltng_port" lineno="65235">
<summary>
Do not audit attempts to sbind to lltng port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_lltng_port" lineno="65254">
<summary>
Make a TCP connection to the lltng port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_lltng_port" lineno="65271">
<summary>
Do not audit attempts to make a TCP connection to lltng port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lltng_client_packets" lineno="65291">
<summary>
Send lltng_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lltng_client_packets" lineno="65310">
<summary>
Do not audit attempts to send lltng_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lltng_client_packets" lineno="65329">
<summary>
Receive lltng_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lltng_client_packets" lineno="65348">
<summary>
Do not audit attempts to receive lltng_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lltng_client_packets" lineno="65367">
<summary>
Send and receive lltng_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lltng_client_packets" lineno="65383">
<summary>
Do not audit attempts to send and receive lltng_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lltng_client_packets" lineno="65398">
<summary>
Relabel packets to lltng_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lltng_server_packets" lineno="65418">
<summary>
Send lltng_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lltng_server_packets" lineno="65437">
<summary>
Do not audit attempts to send lltng_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lltng_server_packets" lineno="65456">
<summary>
Receive lltng_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lltng_server_packets" lineno="65475">
<summary>
Do not audit attempts to receive lltng_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lltng_server_packets" lineno="65494">
<summary>
Send and receive lltng_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lltng_server_packets" lineno="65510">
<summary>
Do not audit attempts to send and receive lltng_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lltng_server_packets" lineno="65525">
<summary>
Relabel packets to lltng_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_llmnr_port" lineno="65547">
<summary>
Send and receive TCP traffic on the llmnr port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_llmnr_port" lineno="65566">
<summary>
Send UDP traffic on the llmnr port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_llmnr_port" lineno="65585">
<summary>
Do not audit attempts to send UDP traffic on the llmnr port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_llmnr_port" lineno="65604">
<summary>
Receive UDP traffic on the llmnr port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_llmnr_port" lineno="65623">
<summary>
Do not audit attempts to receive UDP traffic on the llmnr port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_llmnr_port" lineno="65642">
<summary>
Send and receive UDP traffic on the llmnr port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_llmnr_port" lineno="65659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the llmnr port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_llmnr_port" lineno="65675">
<summary>
Bind TCP sockets to the llmnr port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_llmnr_port" lineno="65695">
<summary>
Bind UDP sockets to the llmnr port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_llmnr_port" lineno="65715">
<summary>
Do not audit attempts to sbind to llmnr port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_llmnr_port" lineno="65734">
<summary>
Make a TCP connection to the llmnr port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_llmnr_port" lineno="65751">
<summary>
Do not audit attempts to make a TCP connection to llmnr port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_llmnr_client_packets" lineno="65771">
<summary>
Send llmnr_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_llmnr_client_packets" lineno="65790">
<summary>
Do not audit attempts to send llmnr_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_llmnr_client_packets" lineno="65809">
<summary>
Receive llmnr_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_llmnr_client_packets" lineno="65828">
<summary>
Do not audit attempts to receive llmnr_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_llmnr_client_packets" lineno="65847">
<summary>
Send and receive llmnr_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_llmnr_client_packets" lineno="65863">
<summary>
Do not audit attempts to send and receive llmnr_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_llmnr_client_packets" lineno="65878">
<summary>
Relabel packets to llmnr_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_llmnr_server_packets" lineno="65898">
<summary>
Send llmnr_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_llmnr_server_packets" lineno="65917">
<summary>
Do not audit attempts to send llmnr_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_llmnr_server_packets" lineno="65936">
<summary>
Receive llmnr_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_llmnr_server_packets" lineno="65955">
<summary>
Do not audit attempts to receive llmnr_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_llmnr_server_packets" lineno="65974">
<summary>
Send and receive llmnr_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_llmnr_server_packets" lineno="65990">
<summary>
Do not audit attempts to send and receive llmnr_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_llmnr_server_packets" lineno="66005">
<summary>
Relabel packets to llmnr_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rabbitmq_port" lineno="66027">
<summary>
Send and receive TCP traffic on the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rabbitmq_port" lineno="66046">
<summary>
Send UDP traffic on the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rabbitmq_port" lineno="66065">
<summary>
Do not audit attempts to send UDP traffic on the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rabbitmq_port" lineno="66084">
<summary>
Receive UDP traffic on the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rabbitmq_port" lineno="66103">
<summary>
Do not audit attempts to receive UDP traffic on the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rabbitmq_port" lineno="66122">
<summary>
Send and receive UDP traffic on the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rabbitmq_port" lineno="66139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rabbitmq_port" lineno="66155">
<summary>
Bind TCP sockets to the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rabbitmq_port" lineno="66175">
<summary>
Bind UDP sockets to the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rabbitmq_port" lineno="66195">
<summary>
Do not audit attempts to sbind to rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rabbitmq_port" lineno="66214">
<summary>
Make a TCP connection to the rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rabbitmq_port" lineno="66231">
<summary>
Do not audit attempts to make a TCP connection to rabbitmq port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rabbitmq_client_packets" lineno="66251">
<summary>
Send rabbitmq_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rabbitmq_client_packets" lineno="66270">
<summary>
Do not audit attempts to send rabbitmq_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rabbitmq_client_packets" lineno="66289">
<summary>
Receive rabbitmq_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rabbitmq_client_packets" lineno="66308">
<summary>
Do not audit attempts to receive rabbitmq_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rabbitmq_client_packets" lineno="66327">
<summary>
Send and receive rabbitmq_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rabbitmq_client_packets" lineno="66343">
<summary>
Do not audit attempts to send and receive rabbitmq_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rabbitmq_client_packets" lineno="66358">
<summary>
Relabel packets to rabbitmq_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rabbitmq_server_packets" lineno="66378">
<summary>
Send rabbitmq_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rabbitmq_server_packets" lineno="66397">
<summary>
Do not audit attempts to send rabbitmq_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rabbitmq_server_packets" lineno="66416">
<summary>
Receive rabbitmq_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rabbitmq_server_packets" lineno="66435">
<summary>
Do not audit attempts to receive rabbitmq_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rabbitmq_server_packets" lineno="66454">
<summary>
Send and receive rabbitmq_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rabbitmq_server_packets" lineno="66470">
<summary>
Do not audit attempts to send and receive rabbitmq_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rabbitmq_server_packets" lineno="66485">
<summary>
Relabel packets to rabbitmq_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rkt_port" lineno="66507">
<summary>
Send and receive TCP traffic on the rkt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rkt_port" lineno="66526">
<summary>
Send UDP traffic on the rkt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rkt_port" lineno="66545">
<summary>
Do not audit attempts to send UDP traffic on the rkt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rkt_port" lineno="66564">
<summary>
Receive UDP traffic on the rkt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rkt_port" lineno="66583">
<summary>
Do not audit attempts to receive UDP traffic on the rkt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rkt_port" lineno="66602">
<summary>
Send and receive UDP traffic on the rkt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rkt_port" lineno="66619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rkt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rkt_port" lineno="66635">
<summary>
Bind TCP sockets to the rkt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rkt_port" lineno="66655">
<summary>
Bind UDP sockets to the rkt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rkt_port" lineno="66675">
<summary>
Do not audit attempts to sbind to rkt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rkt_port" lineno="66694">
<summary>
Make a TCP connection to the rkt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rkt_port" lineno="66711">
<summary>
Do not audit attempts to make a TCP connection to rkt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rkt_client_packets" lineno="66731">
<summary>
Send rkt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rkt_client_packets" lineno="66750">
<summary>
Do not audit attempts to send rkt_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rkt_client_packets" lineno="66769">
<summary>
Receive rkt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rkt_client_packets" lineno="66788">
<summary>
Do not audit attempts to receive rkt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rkt_client_packets" lineno="66807">
<summary>
Send and receive rkt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rkt_client_packets" lineno="66823">
<summary>
Do not audit attempts to send and receive rkt_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rkt_client_packets" lineno="66838">
<summary>
Relabel packets to rkt_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rkt_server_packets" lineno="66858">
<summary>
Send rkt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rkt_server_packets" lineno="66877">
<summary>
Do not audit attempts to send rkt_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rkt_server_packets" lineno="66896">
<summary>
Receive rkt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rkt_server_packets" lineno="66915">
<summary>
Do not audit attempts to receive rkt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rkt_server_packets" lineno="66934">
<summary>
Send and receive rkt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rkt_server_packets" lineno="66950">
<summary>
Do not audit attempts to send and receive rkt_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rkt_server_packets" lineno="66965">
<summary>
Relabel packets to rkt_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rlogin_port" lineno="66987">
<summary>
Send and receive TCP traffic on the rlogin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rlogin_port" lineno="67006">
<summary>
Send UDP traffic on the rlogin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rlogin_port" lineno="67025">
<summary>
Do not audit attempts to send UDP traffic on the rlogin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rlogin_port" lineno="67044">
<summary>
Receive UDP traffic on the rlogin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rlogin_port" lineno="67063">
<summary>
Do not audit attempts to receive UDP traffic on the rlogin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rlogin_port" lineno="67082">
<summary>
Send and receive UDP traffic on the rlogin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rlogin_port" lineno="67099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rlogin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rlogin_port" lineno="67115">
<summary>
Bind TCP sockets to the rlogin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rlogin_port" lineno="67135">
<summary>
Bind UDP sockets to the rlogin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rlogin_port" lineno="67155">
<summary>
Do not audit attempts to sbind to rlogin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rlogin_port" lineno="67174">
<summary>
Make a TCP connection to the rlogin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rlogin_port" lineno="67191">
<summary>
Do not audit attempts to make a TCP connection to rlogin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rlogin_client_packets" lineno="67211">
<summary>
Send rlogin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rlogin_client_packets" lineno="67230">
<summary>
Do not audit attempts to send rlogin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rlogin_client_packets" lineno="67249">
<summary>
Receive rlogin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rlogin_client_packets" lineno="67268">
<summary>
Do not audit attempts to receive rlogin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rlogin_client_packets" lineno="67287">
<summary>
Send and receive rlogin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rlogin_client_packets" lineno="67303">
<summary>
Do not audit attempts to send and receive rlogin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rlogin_client_packets" lineno="67318">
<summary>
Relabel packets to rlogin_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rlogin_server_packets" lineno="67338">
<summary>
Send rlogin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rlogin_server_packets" lineno="67357">
<summary>
Do not audit attempts to send rlogin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rlogin_server_packets" lineno="67376">
<summary>
Receive rlogin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rlogin_server_packets" lineno="67395">
<summary>
Do not audit attempts to receive rlogin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rlogin_server_packets" lineno="67414">
<summary>
Send and receive rlogin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rlogin_server_packets" lineno="67430">
<summary>
Do not audit attempts to send and receive rlogin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rlogin_server_packets" lineno="67445">
<summary>
Relabel packets to rlogin_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rtsclient_port" lineno="67467">
<summary>
Send and receive TCP traffic on the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rtsclient_port" lineno="67486">
<summary>
Send UDP traffic on the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rtsclient_port" lineno="67505">
<summary>
Do not audit attempts to send UDP traffic on the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rtsclient_port" lineno="67524">
<summary>
Receive UDP traffic on the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rtsclient_port" lineno="67543">
<summary>
Do not audit attempts to receive UDP traffic on the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rtsclient_port" lineno="67562">
<summary>
Send and receive UDP traffic on the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rtsclient_port" lineno="67579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rtsclient_port" lineno="67595">
<summary>
Bind TCP sockets to the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rtsclient_port" lineno="67615">
<summary>
Bind UDP sockets to the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rtsclient_port" lineno="67635">
<summary>
Do not audit attempts to sbind to rtsclient port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rtsclient_port" lineno="67654">
<summary>
Make a TCP connection to the rtsclient port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rtsclient_port" lineno="67671">
<summary>
Do not audit attempts to make a TCP connection to rtsclient port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rtsclient_client_packets" lineno="67691">
<summary>
Send rtsclient_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rtsclient_client_packets" lineno="67710">
<summary>
Do not audit attempts to send rtsclient_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rtsclient_client_packets" lineno="67729">
<summary>
Receive rtsclient_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rtsclient_client_packets" lineno="67748">
<summary>
Do not audit attempts to receive rtsclient_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rtsclient_client_packets" lineno="67767">
<summary>
Send and receive rtsclient_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rtsclient_client_packets" lineno="67783">
<summary>
Do not audit attempts to send and receive rtsclient_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rtsclient_client_packets" lineno="67798">
<summary>
Relabel packets to rtsclient_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rtsclient_server_packets" lineno="67818">
<summary>
Send rtsclient_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rtsclient_server_packets" lineno="67837">
<summary>
Do not audit attempts to send rtsclient_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rtsclient_server_packets" lineno="67856">
<summary>
Receive rtsclient_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rtsclient_server_packets" lineno="67875">
<summary>
Do not audit attempts to receive rtsclient_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rtsclient_server_packets" lineno="67894">
<summary>
Send and receive rtsclient_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rtsclient_server_packets" lineno="67910">
<summary>
Do not audit attempts to send and receive rtsclient_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rtsclient_server_packets" lineno="67925">
<summary>
Relabel packets to rtsclient_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_kprop_port" lineno="67947">
<summary>
Send and receive TCP traffic on the kprop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_kprop_port" lineno="67966">
<summary>
Send UDP traffic on the kprop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_kprop_port" lineno="67985">
<summary>
Do not audit attempts to send UDP traffic on the kprop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_kprop_port" lineno="68004">
<summary>
Receive UDP traffic on the kprop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_kprop_port" lineno="68023">
<summary>
Do not audit attempts to receive UDP traffic on the kprop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_kprop_port" lineno="68042">
<summary>
Send and receive UDP traffic on the kprop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_kprop_port" lineno="68059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the kprop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_kprop_port" lineno="68075">
<summary>
Bind TCP sockets to the kprop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_kprop_port" lineno="68095">
<summary>
Bind UDP sockets to the kprop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_kprop_port" lineno="68115">
<summary>
Do not audit attempts to sbind to kprop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_kprop_port" lineno="68134">
<summary>
Make a TCP connection to the kprop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_kprop_port" lineno="68151">
<summary>
Do not audit attempts to make a TCP connection to kprop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kprop_client_packets" lineno="68171">
<summary>
Send kprop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kprop_client_packets" lineno="68190">
<summary>
Do not audit attempts to send kprop_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kprop_client_packets" lineno="68209">
<summary>
Receive kprop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kprop_client_packets" lineno="68228">
<summary>
Do not audit attempts to receive kprop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kprop_client_packets" lineno="68247">
<summary>
Send and receive kprop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kprop_client_packets" lineno="68263">
<summary>
Do not audit attempts to send and receive kprop_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kprop_client_packets" lineno="68278">
<summary>
Relabel packets to kprop_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_kprop_server_packets" lineno="68298">
<summary>
Send kprop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_kprop_server_packets" lineno="68317">
<summary>
Do not audit attempts to send kprop_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_kprop_server_packets" lineno="68336">
<summary>
Receive kprop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_kprop_server_packets" lineno="68355">
<summary>
Do not audit attempts to receive kprop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_kprop_server_packets" lineno="68374">
<summary>
Send and receive kprop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_kprop_server_packets" lineno="68390">
<summary>
Do not audit attempts to send and receive kprop_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_kprop_server_packets" lineno="68405">
<summary>
Relabel packets to kprop_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ktalkd_port" lineno="68427">
<summary>
Send and receive TCP traffic on the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ktalkd_port" lineno="68446">
<summary>
Send UDP traffic on the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ktalkd_port" lineno="68465">
<summary>
Do not audit attempts to send UDP traffic on the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ktalkd_port" lineno="68484">
<summary>
Receive UDP traffic on the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ktalkd_port" lineno="68503">
<summary>
Do not audit attempts to receive UDP traffic on the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ktalkd_port" lineno="68522">
<summary>
Send and receive UDP traffic on the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ktalkd_port" lineno="68539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ktalkd_port" lineno="68555">
<summary>
Bind TCP sockets to the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ktalkd_port" lineno="68575">
<summary>
Bind UDP sockets to the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ktalkd_port" lineno="68595">
<summary>
Do not audit attempts to sbind to ktalkd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ktalkd_port" lineno="68614">
<summary>
Make a TCP connection to the ktalkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ktalkd_port" lineno="68631">
<summary>
Do not audit attempts to make a TCP connection to ktalkd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ktalkd_client_packets" lineno="68651">
<summary>
Send ktalkd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ktalkd_client_packets" lineno="68670">
<summary>
Do not audit attempts to send ktalkd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ktalkd_client_packets" lineno="68689">
<summary>
Receive ktalkd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ktalkd_client_packets" lineno="68708">
<summary>
Do not audit attempts to receive ktalkd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ktalkd_client_packets" lineno="68727">
<summary>
Send and receive ktalkd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ktalkd_client_packets" lineno="68743">
<summary>
Do not audit attempts to send and receive ktalkd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ktalkd_client_packets" lineno="68758">
<summary>
Relabel packets to ktalkd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ktalkd_server_packets" lineno="68778">
<summary>
Send ktalkd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ktalkd_server_packets" lineno="68797">
<summary>
Do not audit attempts to send ktalkd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ktalkd_server_packets" lineno="68816">
<summary>
Receive ktalkd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ktalkd_server_packets" lineno="68835">
<summary>
Do not audit attempts to receive ktalkd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ktalkd_server_packets" lineno="68854">
<summary>
Send and receive ktalkd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ktalkd_server_packets" lineno="68870">
<summary>
Do not audit attempts to send and receive ktalkd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ktalkd_server_packets" lineno="68885">
<summary>
Relabel packets to ktalkd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ldap_port" lineno="68907">
<summary>
Send and receive TCP traffic on the ldap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ldap_port" lineno="68926">
<summary>
Send UDP traffic on the ldap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ldap_port" lineno="68945">
<summary>
Do not audit attempts to send UDP traffic on the ldap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ldap_port" lineno="68964">
<summary>
Receive UDP traffic on the ldap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ldap_port" lineno="68983">
<summary>
Do not audit attempts to receive UDP traffic on the ldap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ldap_port" lineno="69002">
<summary>
Send and receive UDP traffic on the ldap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ldap_port" lineno="69019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ldap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ldap_port" lineno="69035">
<summary>
Bind TCP sockets to the ldap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ldap_port" lineno="69055">
<summary>
Bind UDP sockets to the ldap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ldap_port" lineno="69075">
<summary>
Do not audit attempts to sbind to ldap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ldap_port" lineno="69094">
<summary>
Make a TCP connection to the ldap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ldap_port" lineno="69111">
<summary>
Do not audit attempts to make a TCP connection to ldap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ldap_client_packets" lineno="69131">
<summary>
Send ldap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ldap_client_packets" lineno="69150">
<summary>
Do not audit attempts to send ldap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ldap_client_packets" lineno="69169">
<summary>
Receive ldap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ldap_client_packets" lineno="69188">
<summary>
Do not audit attempts to receive ldap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ldap_client_packets" lineno="69207">
<summary>
Send and receive ldap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ldap_client_packets" lineno="69223">
<summary>
Do not audit attempts to send and receive ldap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ldap_client_packets" lineno="69238">
<summary>
Relabel packets to ldap_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ldap_server_packets" lineno="69258">
<summary>
Send ldap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ldap_server_packets" lineno="69277">
<summary>
Do not audit attempts to send ldap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ldap_server_packets" lineno="69296">
<summary>
Receive ldap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ldap_server_packets" lineno="69315">
<summary>
Do not audit attempts to receive ldap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ldap_server_packets" lineno="69334">
<summary>
Send and receive ldap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ldap_server_packets" lineno="69350">
<summary>
Do not audit attempts to send and receive ldap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ldap_server_packets" lineno="69365">
<summary>
Relabel packets to ldap_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_lirc_port" lineno="69387">
<summary>
Send and receive TCP traffic on the lirc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_lirc_port" lineno="69406">
<summary>
Send UDP traffic on the lirc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_lirc_port" lineno="69425">
<summary>
Do not audit attempts to send UDP traffic on the lirc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_lirc_port" lineno="69444">
<summary>
Receive UDP traffic on the lirc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_lirc_port" lineno="69463">
<summary>
Do not audit attempts to receive UDP traffic on the lirc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_lirc_port" lineno="69482">
<summary>
Send and receive UDP traffic on the lirc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_lirc_port" lineno="69499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lirc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_lirc_port" lineno="69515">
<summary>
Bind TCP sockets to the lirc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_lirc_port" lineno="69535">
<summary>
Bind UDP sockets to the lirc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_lirc_port" lineno="69555">
<summary>
Do not audit attempts to sbind to lirc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_lirc_port" lineno="69574">
<summary>
Make a TCP connection to the lirc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_lirc_port" lineno="69591">
<summary>
Do not audit attempts to make a TCP connection to lirc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lirc_client_packets" lineno="69611">
<summary>
Send lirc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lirc_client_packets" lineno="69630">
<summary>
Do not audit attempts to send lirc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lirc_client_packets" lineno="69649">
<summary>
Receive lirc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lirc_client_packets" lineno="69668">
<summary>
Do not audit attempts to receive lirc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lirc_client_packets" lineno="69687">
<summary>
Send and receive lirc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lirc_client_packets" lineno="69703">
<summary>
Do not audit attempts to send and receive lirc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lirc_client_packets" lineno="69718">
<summary>
Relabel packets to lirc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lirc_server_packets" lineno="69738">
<summary>
Send lirc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lirc_server_packets" lineno="69757">
<summary>
Do not audit attempts to send lirc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lirc_server_packets" lineno="69776">
<summary>
Receive lirc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lirc_server_packets" lineno="69795">
<summary>
Do not audit attempts to receive lirc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lirc_server_packets" lineno="69814">
<summary>
Send and receive lirc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lirc_server_packets" lineno="69830">
<summary>
Do not audit attempts to send and receive lirc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lirc_server_packets" lineno="69845">
<summary>
Relabel packets to lirc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_luci_port" lineno="69867">
<summary>
Send and receive TCP traffic on the luci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_luci_port" lineno="69886">
<summary>
Send UDP traffic on the luci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_luci_port" lineno="69905">
<summary>
Do not audit attempts to send UDP traffic on the luci port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_luci_port" lineno="69924">
<summary>
Receive UDP traffic on the luci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_luci_port" lineno="69943">
<summary>
Do not audit attempts to receive UDP traffic on the luci port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_luci_port" lineno="69962">
<summary>
Send and receive UDP traffic on the luci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_luci_port" lineno="69979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the luci port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_luci_port" lineno="69995">
<summary>
Bind TCP sockets to the luci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_luci_port" lineno="70015">
<summary>
Bind UDP sockets to the luci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_luci_port" lineno="70035">
<summary>
Do not audit attempts to sbind to luci port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_luci_port" lineno="70054">
<summary>
Make a TCP connection to the luci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_luci_port" lineno="70071">
<summary>
Do not audit attempts to make a TCP connection to luci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_luci_client_packets" lineno="70091">
<summary>
Send luci_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_luci_client_packets" lineno="70110">
<summary>
Do not audit attempts to send luci_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_luci_client_packets" lineno="70129">
<summary>
Receive luci_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_luci_client_packets" lineno="70148">
<summary>
Do not audit attempts to receive luci_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_luci_client_packets" lineno="70167">
<summary>
Send and receive luci_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_luci_client_packets" lineno="70183">
<summary>
Do not audit attempts to send and receive luci_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_luci_client_packets" lineno="70198">
<summary>
Relabel packets to luci_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_luci_server_packets" lineno="70218">
<summary>
Send luci_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_luci_server_packets" lineno="70237">
<summary>
Do not audit attempts to send luci_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_luci_server_packets" lineno="70256">
<summary>
Receive luci_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_luci_server_packets" lineno="70275">
<summary>
Do not audit attempts to receive luci_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_luci_server_packets" lineno="70294">
<summary>
Send and receive luci_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_luci_server_packets" lineno="70310">
<summary>
Do not audit attempts to send and receive luci_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_luci_server_packets" lineno="70325">
<summary>
Relabel packets to luci_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_lmtp_port" lineno="70347">
<summary>
Send and receive TCP traffic on the lmtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_lmtp_port" lineno="70366">
<summary>
Send UDP traffic on the lmtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_lmtp_port" lineno="70385">
<summary>
Do not audit attempts to send UDP traffic on the lmtp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_lmtp_port" lineno="70404">
<summary>
Receive UDP traffic on the lmtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_lmtp_port" lineno="70423">
<summary>
Do not audit attempts to receive UDP traffic on the lmtp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_lmtp_port" lineno="70442">
<summary>
Send and receive UDP traffic on the lmtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_lmtp_port" lineno="70459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lmtp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_lmtp_port" lineno="70475">
<summary>
Bind TCP sockets to the lmtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_lmtp_port" lineno="70495">
<summary>
Bind UDP sockets to the lmtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_lmtp_port" lineno="70515">
<summary>
Do not audit attempts to sbind to lmtp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_lmtp_port" lineno="70534">
<summary>
Make a TCP connection to the lmtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_lmtp_port" lineno="70551">
<summary>
Do not audit attempts to make a TCP connection to lmtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lmtp_client_packets" lineno="70571">
<summary>
Send lmtp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lmtp_client_packets" lineno="70590">
<summary>
Do not audit attempts to send lmtp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lmtp_client_packets" lineno="70609">
<summary>
Receive lmtp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lmtp_client_packets" lineno="70628">
<summary>
Do not audit attempts to receive lmtp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lmtp_client_packets" lineno="70647">
<summary>
Send and receive lmtp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lmtp_client_packets" lineno="70663">
<summary>
Do not audit attempts to send and receive lmtp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lmtp_client_packets" lineno="70678">
<summary>
Relabel packets to lmtp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lmtp_server_packets" lineno="70698">
<summary>
Send lmtp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lmtp_server_packets" lineno="70717">
<summary>
Do not audit attempts to send lmtp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lmtp_server_packets" lineno="70736">
<summary>
Receive lmtp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lmtp_server_packets" lineno="70755">
<summary>
Do not audit attempts to receive lmtp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lmtp_server_packets" lineno="70774">
<summary>
Send and receive lmtp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lmtp_server_packets" lineno="70790">
<summary>
Do not audit attempts to send and receive lmtp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lmtp_server_packets" lineno="70805">
<summary>
Relabel packets to lmtp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_lrrd_port" lineno="70827">
<summary>
Send and receive TCP traffic on the lrrd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_lrrd_port" lineno="70846">
<summary>
Send UDP traffic on the lrrd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_lrrd_port" lineno="70865">
<summary>
Do not audit attempts to send UDP traffic on the lrrd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_lrrd_port" lineno="70884">
<summary>
Receive UDP traffic on the lrrd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_lrrd_port" lineno="70903">
<summary>
Do not audit attempts to receive UDP traffic on the lrrd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_lrrd_port" lineno="70922">
<summary>
Send and receive UDP traffic on the lrrd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_lrrd_port" lineno="70939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lrrd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_lrrd_port" lineno="70955">
<summary>
Bind TCP sockets to the lrrd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_lrrd_port" lineno="70975">
<summary>
Bind UDP sockets to the lrrd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_lrrd_port" lineno="70995">
<summary>
Do not audit attempts to sbind to lrrd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_lrrd_port" lineno="71014">
<summary>
Make a TCP connection to the lrrd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_lrrd_port" lineno="71031">
<summary>
Do not audit attempts to make a TCP connection to lrrd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lrrd_client_packets" lineno="71051">
<summary>
Send lrrd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lrrd_client_packets" lineno="71070">
<summary>
Do not audit attempts to send lrrd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lrrd_client_packets" lineno="71089">
<summary>
Receive lrrd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lrrd_client_packets" lineno="71108">
<summary>
Do not audit attempts to receive lrrd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lrrd_client_packets" lineno="71127">
<summary>
Send and receive lrrd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lrrd_client_packets" lineno="71143">
<summary>
Do not audit attempts to send and receive lrrd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lrrd_client_packets" lineno="71158">
<summary>
Relabel packets to lrrd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lrrd_server_packets" lineno="71178">
<summary>
Send lrrd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lrrd_server_packets" lineno="71197">
<summary>
Do not audit attempts to send lrrd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lrrd_server_packets" lineno="71216">
<summary>
Receive lrrd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lrrd_server_packets" lineno="71235">
<summary>
Do not audit attempts to receive lrrd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lrrd_server_packets" lineno="71254">
<summary>
Send and receive lrrd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lrrd_server_packets" lineno="71270">
<summary>
Do not audit attempts to send and receive lrrd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lrrd_server_packets" lineno="71285">
<summary>
Relabel packets to lrrd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_lsm_plugin_port" lineno="71307">
<summary>
Send and receive TCP traffic on the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_lsm_plugin_port" lineno="71326">
<summary>
Send UDP traffic on the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_lsm_plugin_port" lineno="71345">
<summary>
Do not audit attempts to send UDP traffic on the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_lsm_plugin_port" lineno="71364">
<summary>
Receive UDP traffic on the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_lsm_plugin_port" lineno="71383">
<summary>
Do not audit attempts to receive UDP traffic on the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_lsm_plugin_port" lineno="71402">
<summary>
Send and receive UDP traffic on the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_lsm_plugin_port" lineno="71419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_lsm_plugin_port" lineno="71435">
<summary>
Bind TCP sockets to the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_lsm_plugin_port" lineno="71455">
<summary>
Bind UDP sockets to the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_lsm_plugin_port" lineno="71475">
<summary>
Do not audit attempts to sbind to lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_lsm_plugin_port" lineno="71494">
<summary>
Make a TCP connection to the lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_lsm_plugin_port" lineno="71511">
<summary>
Do not audit attempts to make a TCP connection to lsm_plugin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lsm_plugin_client_packets" lineno="71531">
<summary>
Send lsm_plugin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lsm_plugin_client_packets" lineno="71550">
<summary>
Do not audit attempts to send lsm_plugin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lsm_plugin_client_packets" lineno="71569">
<summary>
Receive lsm_plugin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lsm_plugin_client_packets" lineno="71588">
<summary>
Do not audit attempts to receive lsm_plugin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lsm_plugin_client_packets" lineno="71607">
<summary>
Send and receive lsm_plugin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lsm_plugin_client_packets" lineno="71623">
<summary>
Do not audit attempts to send and receive lsm_plugin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lsm_plugin_client_packets" lineno="71638">
<summary>
Relabel packets to lsm_plugin_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_lsm_plugin_server_packets" lineno="71658">
<summary>
Send lsm_plugin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_lsm_plugin_server_packets" lineno="71677">
<summary>
Do not audit attempts to send lsm_plugin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_lsm_plugin_server_packets" lineno="71696">
<summary>
Receive lsm_plugin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_lsm_plugin_server_packets" lineno="71715">
<summary>
Do not audit attempts to receive lsm_plugin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_lsm_plugin_server_packets" lineno="71734">
<summary>
Send and receive lsm_plugin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_lsm_plugin_server_packets" lineno="71750">
<summary>
Do not audit attempts to send and receive lsm_plugin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_lsm_plugin_server_packets" lineno="71765">
<summary>
Relabel packets to lsm_plugin_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_l2tp_port" lineno="71787">
<summary>
Send and receive TCP traffic on the l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_l2tp_port" lineno="71806">
<summary>
Send UDP traffic on the l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_l2tp_port" lineno="71825">
<summary>
Do not audit attempts to send UDP traffic on the l2tp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_l2tp_port" lineno="71844">
<summary>
Receive UDP traffic on the l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_l2tp_port" lineno="71863">
<summary>
Do not audit attempts to receive UDP traffic on the l2tp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_l2tp_port" lineno="71882">
<summary>
Send and receive UDP traffic on the l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_l2tp_port" lineno="71899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the l2tp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_l2tp_port" lineno="71915">
<summary>
Bind TCP sockets to the l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_l2tp_port" lineno="71935">
<summary>
Bind UDP sockets to the l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_l2tp_port" lineno="71955">
<summary>
Do not audit attempts to sbind to l2tp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_l2tp_port" lineno="71974">
<summary>
Make a TCP connection to the l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_l2tp_port" lineno="71991">
<summary>
Do not audit attempts to make a TCP connection to l2tp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_l2tp_client_packets" lineno="72011">
<summary>
Send l2tp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_l2tp_client_packets" lineno="72030">
<summary>
Do not audit attempts to send l2tp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_l2tp_client_packets" lineno="72049">
<summary>
Receive l2tp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_l2tp_client_packets" lineno="72068">
<summary>
Do not audit attempts to receive l2tp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_l2tp_client_packets" lineno="72087">
<summary>
Send and receive l2tp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_l2tp_client_packets" lineno="72103">
<summary>
Do not audit attempts to send and receive l2tp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_l2tp_client_packets" lineno="72118">
<summary>
Relabel packets to l2tp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_l2tp_server_packets" lineno="72138">
<summary>
Send l2tp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_l2tp_server_packets" lineno="72157">
<summary>
Do not audit attempts to send l2tp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_l2tp_server_packets" lineno="72176">
<summary>
Receive l2tp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_l2tp_server_packets" lineno="72195">
<summary>
Do not audit attempts to receive l2tp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_l2tp_server_packets" lineno="72214">
<summary>
Send and receive l2tp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_l2tp_server_packets" lineno="72230">
<summary>
Do not audit attempts to send and receive l2tp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_l2tp_server_packets" lineno="72245">
<summary>
Relabel packets to l2tp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mail_port" lineno="72267">
<summary>
Send and receive TCP traffic on the mail port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mail_port" lineno="72286">
<summary>
Send UDP traffic on the mail port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mail_port" lineno="72305">
<summary>
Do not audit attempts to send UDP traffic on the mail port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mail_port" lineno="72324">
<summary>
Receive UDP traffic on the mail port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mail_port" lineno="72343">
<summary>
Do not audit attempts to receive UDP traffic on the mail port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mail_port" lineno="72362">
<summary>
Send and receive UDP traffic on the mail port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mail_port" lineno="72379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mail port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mail_port" lineno="72395">
<summary>
Bind TCP sockets to the mail port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mail_port" lineno="72415">
<summary>
Bind UDP sockets to the mail port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mail_port" lineno="72435">
<summary>
Do not audit attempts to sbind to mail port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mail_port" lineno="72454">
<summary>
Make a TCP connection to the mail port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mail_port" lineno="72471">
<summary>
Do not audit attempts to make a TCP connection to mail port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mail_client_packets" lineno="72491">
<summary>
Send mail_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mail_client_packets" lineno="72510">
<summary>
Do not audit attempts to send mail_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mail_client_packets" lineno="72529">
<summary>
Receive mail_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mail_client_packets" lineno="72548">
<summary>
Do not audit attempts to receive mail_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mail_client_packets" lineno="72567">
<summary>
Send and receive mail_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mail_client_packets" lineno="72583">
<summary>
Do not audit attempts to send and receive mail_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mail_client_packets" lineno="72598">
<summary>
Relabel packets to mail_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mail_server_packets" lineno="72618">
<summary>
Send mail_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mail_server_packets" lineno="72637">
<summary>
Do not audit attempts to send mail_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mail_server_packets" lineno="72656">
<summary>
Receive mail_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mail_server_packets" lineno="72675">
<summary>
Do not audit attempts to receive mail_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mail_server_packets" lineno="72694">
<summary>
Send and receive mail_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mail_server_packets" lineno="72710">
<summary>
Do not audit attempts to send and receive mail_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mail_server_packets" lineno="72725">
<summary>
Relabel packets to mail_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mailbox_port" lineno="72747">
<summary>
Send and receive TCP traffic on the mailbox port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mailbox_port" lineno="72766">
<summary>
Send UDP traffic on the mailbox port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mailbox_port" lineno="72785">
<summary>
Do not audit attempts to send UDP traffic on the mailbox port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mailbox_port" lineno="72804">
<summary>
Receive UDP traffic on the mailbox port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mailbox_port" lineno="72823">
<summary>
Do not audit attempts to receive UDP traffic on the mailbox port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mailbox_port" lineno="72842">
<summary>
Send and receive UDP traffic on the mailbox port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mailbox_port" lineno="72859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mailbox port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mailbox_port" lineno="72875">
<summary>
Bind TCP sockets to the mailbox port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mailbox_port" lineno="72895">
<summary>
Bind UDP sockets to the mailbox port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mailbox_port" lineno="72915">
<summary>
Do not audit attempts to sbind to mailbox port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mailbox_port" lineno="72934">
<summary>
Make a TCP connection to the mailbox port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mailbox_port" lineno="72951">
<summary>
Do not audit attempts to make a TCP connection to mailbox port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mailbox_client_packets" lineno="72971">
<summary>
Send mailbox_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mailbox_client_packets" lineno="72990">
<summary>
Do not audit attempts to send mailbox_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mailbox_client_packets" lineno="73009">
<summary>
Receive mailbox_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mailbox_client_packets" lineno="73028">
<summary>
Do not audit attempts to receive mailbox_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mailbox_client_packets" lineno="73047">
<summary>
Send and receive mailbox_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mailbox_client_packets" lineno="73063">
<summary>
Do not audit attempts to send and receive mailbox_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mailbox_client_packets" lineno="73078">
<summary>
Relabel packets to mailbox_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mailbox_server_packets" lineno="73098">
<summary>
Send mailbox_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mailbox_server_packets" lineno="73117">
<summary>
Do not audit attempts to send mailbox_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mailbox_server_packets" lineno="73136">
<summary>
Receive mailbox_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mailbox_server_packets" lineno="73155">
<summary>
Do not audit attempts to receive mailbox_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mailbox_server_packets" lineno="73174">
<summary>
Send and receive mailbox_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mailbox_server_packets" lineno="73190">
<summary>
Do not audit attempts to send and receive mailbox_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mailbox_server_packets" lineno="73205">
<summary>
Relabel packets to mailbox_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_matahari_port" lineno="73227">
<summary>
Send and receive TCP traffic on the matahari port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_matahari_port" lineno="73246">
<summary>
Send UDP traffic on the matahari port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_matahari_port" lineno="73265">
<summary>
Do not audit attempts to send UDP traffic on the matahari port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_matahari_port" lineno="73284">
<summary>
Receive UDP traffic on the matahari port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_matahari_port" lineno="73303">
<summary>
Do not audit attempts to receive UDP traffic on the matahari port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_matahari_port" lineno="73322">
<summary>
Send and receive UDP traffic on the matahari port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_matahari_port" lineno="73339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the matahari port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_matahari_port" lineno="73355">
<summary>
Bind TCP sockets to the matahari port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_matahari_port" lineno="73375">
<summary>
Bind UDP sockets to the matahari port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_matahari_port" lineno="73395">
<summary>
Do not audit attempts to sbind to matahari port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_matahari_port" lineno="73414">
<summary>
Make a TCP connection to the matahari port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_matahari_port" lineno="73431">
<summary>
Do not audit attempts to make a TCP connection to matahari port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_matahari_client_packets" lineno="73451">
<summary>
Send matahari_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_matahari_client_packets" lineno="73470">
<summary>
Do not audit attempts to send matahari_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_matahari_client_packets" lineno="73489">
<summary>
Receive matahari_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_matahari_client_packets" lineno="73508">
<summary>
Do not audit attempts to receive matahari_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_matahari_client_packets" lineno="73527">
<summary>
Send and receive matahari_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_matahari_client_packets" lineno="73543">
<summary>
Do not audit attempts to send and receive matahari_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_matahari_client_packets" lineno="73558">
<summary>
Relabel packets to matahari_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_matahari_server_packets" lineno="73578">
<summary>
Send matahari_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_matahari_server_packets" lineno="73597">
<summary>
Do not audit attempts to send matahari_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_matahari_server_packets" lineno="73616">
<summary>
Receive matahari_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_matahari_server_packets" lineno="73635">
<summary>
Do not audit attempts to receive matahari_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_matahari_server_packets" lineno="73654">
<summary>
Send and receive matahari_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_matahari_server_packets" lineno="73670">
<summary>
Do not audit attempts to send and receive matahari_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_matahari_server_packets" lineno="73685">
<summary>
Relabel packets to matahari_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_memcache_port" lineno="73707">
<summary>
Send and receive TCP traffic on the memcache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_memcache_port" lineno="73726">
<summary>
Send UDP traffic on the memcache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_memcache_port" lineno="73745">
<summary>
Do not audit attempts to send UDP traffic on the memcache port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_memcache_port" lineno="73764">
<summary>
Receive UDP traffic on the memcache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_memcache_port" lineno="73783">
<summary>
Do not audit attempts to receive UDP traffic on the memcache port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_memcache_port" lineno="73802">
<summary>
Send and receive UDP traffic on the memcache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_memcache_port" lineno="73819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the memcache port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_memcache_port" lineno="73835">
<summary>
Bind TCP sockets to the memcache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_memcache_port" lineno="73855">
<summary>
Bind UDP sockets to the memcache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_memcache_port" lineno="73875">
<summary>
Do not audit attempts to sbind to memcache port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_memcache_port" lineno="73894">
<summary>
Make a TCP connection to the memcache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_memcache_port" lineno="73911">
<summary>
Do not audit attempts to make a TCP connection to memcache port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_memcache_client_packets" lineno="73931">
<summary>
Send memcache_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_memcache_client_packets" lineno="73950">
<summary>
Do not audit attempts to send memcache_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_memcache_client_packets" lineno="73969">
<summary>
Receive memcache_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_memcache_client_packets" lineno="73988">
<summary>
Do not audit attempts to receive memcache_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_memcache_client_packets" lineno="74007">
<summary>
Send and receive memcache_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_memcache_client_packets" lineno="74023">
<summary>
Do not audit attempts to send and receive memcache_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_memcache_client_packets" lineno="74038">
<summary>
Relabel packets to memcache_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_memcache_server_packets" lineno="74058">
<summary>
Send memcache_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_memcache_server_packets" lineno="74077">
<summary>
Do not audit attempts to send memcache_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_memcache_server_packets" lineno="74096">
<summary>
Receive memcache_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_memcache_server_packets" lineno="74115">
<summary>
Do not audit attempts to receive memcache_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_memcache_server_packets" lineno="74134">
<summary>
Send and receive memcache_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_memcache_server_packets" lineno="74150">
<summary>
Do not audit attempts to send and receive memcache_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_memcache_server_packets" lineno="74165">
<summary>
Relabel packets to memcache_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_milter_port" lineno="74187">
<summary>
Send and receive TCP traffic on the milter port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_milter_port" lineno="74206">
<summary>
Send UDP traffic on the milter port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_milter_port" lineno="74225">
<summary>
Do not audit attempts to send UDP traffic on the milter port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_milter_port" lineno="74244">
<summary>
Receive UDP traffic on the milter port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_milter_port" lineno="74263">
<summary>
Do not audit attempts to receive UDP traffic on the milter port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_milter_port" lineno="74282">
<summary>
Send and receive UDP traffic on the milter port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_milter_port" lineno="74299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the milter port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_milter_port" lineno="74315">
<summary>
Bind TCP sockets to the milter port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_milter_port" lineno="74335">
<summary>
Bind UDP sockets to the milter port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_milter_port" lineno="74355">
<summary>
Do not audit attempts to sbind to milter port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_milter_port" lineno="74374">
<summary>
Make a TCP connection to the milter port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_milter_port" lineno="74391">
<summary>
Do not audit attempts to make a TCP connection to milter port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_milter_client_packets" lineno="74411">
<summary>
Send milter_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_milter_client_packets" lineno="74430">
<summary>
Do not audit attempts to send milter_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_milter_client_packets" lineno="74449">
<summary>
Receive milter_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_milter_client_packets" lineno="74468">
<summary>
Do not audit attempts to receive milter_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_milter_client_packets" lineno="74487">
<summary>
Send and receive milter_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_milter_client_packets" lineno="74503">
<summary>
Do not audit attempts to send and receive milter_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_milter_client_packets" lineno="74518">
<summary>
Relabel packets to milter_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_milter_server_packets" lineno="74538">
<summary>
Send milter_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_milter_server_packets" lineno="74557">
<summary>
Do not audit attempts to send milter_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_milter_server_packets" lineno="74576">
<summary>
Receive milter_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_milter_server_packets" lineno="74595">
<summary>
Do not audit attempts to receive milter_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_milter_server_packets" lineno="74614">
<summary>
Send and receive milter_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_milter_server_packets" lineno="74630">
<summary>
Do not audit attempts to send and receive milter_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_milter_server_packets" lineno="74645">
<summary>
Relabel packets to milter_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mmcc_port" lineno="74667">
<summary>
Send and receive TCP traffic on the mmcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mmcc_port" lineno="74686">
<summary>
Send UDP traffic on the mmcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mmcc_port" lineno="74705">
<summary>
Do not audit attempts to send UDP traffic on the mmcc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mmcc_port" lineno="74724">
<summary>
Receive UDP traffic on the mmcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mmcc_port" lineno="74743">
<summary>
Do not audit attempts to receive UDP traffic on the mmcc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mmcc_port" lineno="74762">
<summary>
Send and receive UDP traffic on the mmcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mmcc_port" lineno="74779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mmcc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mmcc_port" lineno="74795">
<summary>
Bind TCP sockets to the mmcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mmcc_port" lineno="74815">
<summary>
Bind UDP sockets to the mmcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mmcc_port" lineno="74835">
<summary>
Do not audit attempts to sbind to mmcc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mmcc_port" lineno="74854">
<summary>
Make a TCP connection to the mmcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mmcc_port" lineno="74871">
<summary>
Do not audit attempts to make a TCP connection to mmcc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mmcc_client_packets" lineno="74891">
<summary>
Send mmcc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mmcc_client_packets" lineno="74910">
<summary>
Do not audit attempts to send mmcc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mmcc_client_packets" lineno="74929">
<summary>
Receive mmcc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mmcc_client_packets" lineno="74948">
<summary>
Do not audit attempts to receive mmcc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mmcc_client_packets" lineno="74967">
<summary>
Send and receive mmcc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mmcc_client_packets" lineno="74983">
<summary>
Do not audit attempts to send and receive mmcc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mmcc_client_packets" lineno="74998">
<summary>
Relabel packets to mmcc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mmcc_server_packets" lineno="75018">
<summary>
Send mmcc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mmcc_server_packets" lineno="75037">
<summary>
Do not audit attempts to send mmcc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mmcc_server_packets" lineno="75056">
<summary>
Receive mmcc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mmcc_server_packets" lineno="75075">
<summary>
Do not audit attempts to receive mmcc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mmcc_server_packets" lineno="75094">
<summary>
Send and receive mmcc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mmcc_server_packets" lineno="75110">
<summary>
Do not audit attempts to send and receive mmcc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mmcc_server_packets" lineno="75125">
<summary>
Relabel packets to mmcc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mongod_port" lineno="75147">
<summary>
Send and receive TCP traffic on the mongod port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mongod_port" lineno="75166">
<summary>
Send UDP traffic on the mongod port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mongod_port" lineno="75185">
<summary>
Do not audit attempts to send UDP traffic on the mongod port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mongod_port" lineno="75204">
<summary>
Receive UDP traffic on the mongod port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mongod_port" lineno="75223">
<summary>
Do not audit attempts to receive UDP traffic on the mongod port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mongod_port" lineno="75242">
<summary>
Send and receive UDP traffic on the mongod port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mongod_port" lineno="75259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mongod port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mongod_port" lineno="75275">
<summary>
Bind TCP sockets to the mongod port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mongod_port" lineno="75295">
<summary>
Bind UDP sockets to the mongod port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mongod_port" lineno="75315">
<summary>
Do not audit attempts to sbind to mongod port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mongod_port" lineno="75334">
<summary>
Make a TCP connection to the mongod port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mongod_port" lineno="75351">
<summary>
Do not audit attempts to make a TCP connection to mongod port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mongod_client_packets" lineno="75371">
<summary>
Send mongod_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mongod_client_packets" lineno="75390">
<summary>
Do not audit attempts to send mongod_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mongod_client_packets" lineno="75409">
<summary>
Receive mongod_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mongod_client_packets" lineno="75428">
<summary>
Do not audit attempts to receive mongod_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mongod_client_packets" lineno="75447">
<summary>
Send and receive mongod_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mongod_client_packets" lineno="75463">
<summary>
Do not audit attempts to send and receive mongod_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mongod_client_packets" lineno="75478">
<summary>
Relabel packets to mongod_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mongod_server_packets" lineno="75498">
<summary>
Send mongod_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mongod_server_packets" lineno="75517">
<summary>
Do not audit attempts to send mongod_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mongod_server_packets" lineno="75536">
<summary>
Receive mongod_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mongod_server_packets" lineno="75555">
<summary>
Do not audit attempts to receive mongod_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mongod_server_packets" lineno="75574">
<summary>
Send and receive mongod_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mongod_server_packets" lineno="75590">
<summary>
Do not audit attempts to send and receive mongod_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mongod_server_packets" lineno="75605">
<summary>
Relabel packets to mongod_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_monopd_port" lineno="75627">
<summary>
Send and receive TCP traffic on the monopd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_monopd_port" lineno="75646">
<summary>
Send UDP traffic on the monopd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_monopd_port" lineno="75665">
<summary>
Do not audit attempts to send UDP traffic on the monopd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_monopd_port" lineno="75684">
<summary>
Receive UDP traffic on the monopd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_monopd_port" lineno="75703">
<summary>
Do not audit attempts to receive UDP traffic on the monopd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_monopd_port" lineno="75722">
<summary>
Send and receive UDP traffic on the monopd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_monopd_port" lineno="75739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the monopd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_monopd_port" lineno="75755">
<summary>
Bind TCP sockets to the monopd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_monopd_port" lineno="75775">
<summary>
Bind UDP sockets to the monopd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_monopd_port" lineno="75795">
<summary>
Do not audit attempts to sbind to monopd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_monopd_port" lineno="75814">
<summary>
Make a TCP connection to the monopd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_monopd_port" lineno="75831">
<summary>
Do not audit attempts to make a TCP connection to monopd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_monopd_client_packets" lineno="75851">
<summary>
Send monopd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_monopd_client_packets" lineno="75870">
<summary>
Do not audit attempts to send monopd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_monopd_client_packets" lineno="75889">
<summary>
Receive monopd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_monopd_client_packets" lineno="75908">
<summary>
Do not audit attempts to receive monopd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_monopd_client_packets" lineno="75927">
<summary>
Send and receive monopd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_monopd_client_packets" lineno="75943">
<summary>
Do not audit attempts to send and receive monopd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_monopd_client_packets" lineno="75958">
<summary>
Relabel packets to monopd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_monopd_server_packets" lineno="75978">
<summary>
Send monopd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_monopd_server_packets" lineno="75997">
<summary>
Do not audit attempts to send monopd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_monopd_server_packets" lineno="76016">
<summary>
Receive monopd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_monopd_server_packets" lineno="76035">
<summary>
Do not audit attempts to receive monopd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_monopd_server_packets" lineno="76054">
<summary>
Send and receive monopd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_monopd_server_packets" lineno="76070">
<summary>
Do not audit attempts to send and receive monopd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_monopd_server_packets" lineno="76085">
<summary>
Relabel packets to monopd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mountd_port" lineno="76107">
<summary>
Send and receive TCP traffic on the mountd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mountd_port" lineno="76126">
<summary>
Send UDP traffic on the mountd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mountd_port" lineno="76145">
<summary>
Do not audit attempts to send UDP traffic on the mountd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mountd_port" lineno="76164">
<summary>
Receive UDP traffic on the mountd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mountd_port" lineno="76183">
<summary>
Do not audit attempts to receive UDP traffic on the mountd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mountd_port" lineno="76202">
<summary>
Send and receive UDP traffic on the mountd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mountd_port" lineno="76219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mountd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mountd_port" lineno="76235">
<summary>
Bind TCP sockets to the mountd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mountd_port" lineno="76255">
<summary>
Bind UDP sockets to the mountd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mountd_port" lineno="76275">
<summary>
Do not audit attempts to sbind to mountd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mountd_port" lineno="76294">
<summary>
Make a TCP connection to the mountd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mountd_port" lineno="76311">
<summary>
Do not audit attempts to make a TCP connection to mountd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mountd_client_packets" lineno="76331">
<summary>
Send mountd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mountd_client_packets" lineno="76350">
<summary>
Do not audit attempts to send mountd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mountd_client_packets" lineno="76369">
<summary>
Receive mountd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mountd_client_packets" lineno="76388">
<summary>
Do not audit attempts to receive mountd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mountd_client_packets" lineno="76407">
<summary>
Send and receive mountd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mountd_client_packets" lineno="76423">
<summary>
Do not audit attempts to send and receive mountd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mountd_client_packets" lineno="76438">
<summary>
Relabel packets to mountd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mountd_server_packets" lineno="76458">
<summary>
Send mountd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mountd_server_packets" lineno="76477">
<summary>
Do not audit attempts to send mountd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mountd_server_packets" lineno="76496">
<summary>
Receive mountd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mountd_server_packets" lineno="76515">
<summary>
Do not audit attempts to receive mountd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mountd_server_packets" lineno="76534">
<summary>
Send and receive mountd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mountd_server_packets" lineno="76550">
<summary>
Do not audit attempts to send and receive mountd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mountd_server_packets" lineno="76565">
<summary>
Relabel packets to mountd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_movaz_ssc_port" lineno="76587">
<summary>
Send and receive TCP traffic on the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_movaz_ssc_port" lineno="76606">
<summary>
Send UDP traffic on the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_movaz_ssc_port" lineno="76625">
<summary>
Do not audit attempts to send UDP traffic on the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_movaz_ssc_port" lineno="76644">
<summary>
Receive UDP traffic on the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_movaz_ssc_port" lineno="76663">
<summary>
Do not audit attempts to receive UDP traffic on the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_movaz_ssc_port" lineno="76682">
<summary>
Send and receive UDP traffic on the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_movaz_ssc_port" lineno="76699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_movaz_ssc_port" lineno="76715">
<summary>
Bind TCP sockets to the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_movaz_ssc_port" lineno="76735">
<summary>
Bind UDP sockets to the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_movaz_ssc_port" lineno="76755">
<summary>
Do not audit attempts to sbind to movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_movaz_ssc_port" lineno="76774">
<summary>
Make a TCP connection to the movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_movaz_ssc_port" lineno="76791">
<summary>
Do not audit attempts to make a TCP connection to movaz_ssc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_movaz_ssc_client_packets" lineno="76811">
<summary>
Send movaz_ssc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_movaz_ssc_client_packets" lineno="76830">
<summary>
Do not audit attempts to send movaz_ssc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_movaz_ssc_client_packets" lineno="76849">
<summary>
Receive movaz_ssc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_movaz_ssc_client_packets" lineno="76868">
<summary>
Do not audit attempts to receive movaz_ssc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_movaz_ssc_client_packets" lineno="76887">
<summary>
Send and receive movaz_ssc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_movaz_ssc_client_packets" lineno="76903">
<summary>
Do not audit attempts to send and receive movaz_ssc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_movaz_ssc_client_packets" lineno="76918">
<summary>
Relabel packets to movaz_ssc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_movaz_ssc_server_packets" lineno="76938">
<summary>
Send movaz_ssc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_movaz_ssc_server_packets" lineno="76957">
<summary>
Do not audit attempts to send movaz_ssc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_movaz_ssc_server_packets" lineno="76976">
<summary>
Receive movaz_ssc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_movaz_ssc_server_packets" lineno="76995">
<summary>
Do not audit attempts to receive movaz_ssc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_movaz_ssc_server_packets" lineno="77014">
<summary>
Send and receive movaz_ssc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_movaz_ssc_server_packets" lineno="77030">
<summary>
Do not audit attempts to send and receive movaz_ssc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_movaz_ssc_server_packets" lineno="77045">
<summary>
Relabel packets to movaz_ssc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mpd_port" lineno="77067">
<summary>
Send and receive TCP traffic on the mpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mpd_port" lineno="77086">
<summary>
Send UDP traffic on the mpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mpd_port" lineno="77105">
<summary>
Do not audit attempts to send UDP traffic on the mpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mpd_port" lineno="77124">
<summary>
Receive UDP traffic on the mpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mpd_port" lineno="77143">
<summary>
Do not audit attempts to receive UDP traffic on the mpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mpd_port" lineno="77162">
<summary>
Send and receive UDP traffic on the mpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mpd_port" lineno="77179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mpd_port" lineno="77195">
<summary>
Bind TCP sockets to the mpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mpd_port" lineno="77215">
<summary>
Bind UDP sockets to the mpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mpd_port" lineno="77235">
<summary>
Do not audit attempts to sbind to mpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mpd_port" lineno="77254">
<summary>
Make a TCP connection to the mpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mpd_port" lineno="77271">
<summary>
Do not audit attempts to make a TCP connection to mpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mpd_client_packets" lineno="77291">
<summary>
Send mpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mpd_client_packets" lineno="77310">
<summary>
Do not audit attempts to send mpd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mpd_client_packets" lineno="77329">
<summary>
Receive mpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mpd_client_packets" lineno="77348">
<summary>
Do not audit attempts to receive mpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mpd_client_packets" lineno="77367">
<summary>
Send and receive mpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mpd_client_packets" lineno="77383">
<summary>
Do not audit attempts to send and receive mpd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mpd_client_packets" lineno="77398">
<summary>
Relabel packets to mpd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mpd_server_packets" lineno="77418">
<summary>
Send mpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mpd_server_packets" lineno="77437">
<summary>
Do not audit attempts to send mpd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mpd_server_packets" lineno="77456">
<summary>
Receive mpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mpd_server_packets" lineno="77475">
<summary>
Do not audit attempts to receive mpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mpd_server_packets" lineno="77494">
<summary>
Send and receive mpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mpd_server_packets" lineno="77510">
<summary>
Do not audit attempts to send and receive mpd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mpd_server_packets" lineno="77525">
<summary>
Relabel packets to mpd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_msnp_port" lineno="77547">
<summary>
Send and receive TCP traffic on the msnp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_msnp_port" lineno="77566">
<summary>
Send UDP traffic on the msnp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_msnp_port" lineno="77585">
<summary>
Do not audit attempts to send UDP traffic on the msnp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_msnp_port" lineno="77604">
<summary>
Receive UDP traffic on the msnp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_msnp_port" lineno="77623">
<summary>
Do not audit attempts to receive UDP traffic on the msnp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_msnp_port" lineno="77642">
<summary>
Send and receive UDP traffic on the msnp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_msnp_port" lineno="77659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the msnp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_msnp_port" lineno="77675">
<summary>
Bind TCP sockets to the msnp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_msnp_port" lineno="77695">
<summary>
Bind UDP sockets to the msnp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_msnp_port" lineno="77715">
<summary>
Do not audit attempts to sbind to msnp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_msnp_port" lineno="77734">
<summary>
Make a TCP connection to the msnp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_msnp_port" lineno="77751">
<summary>
Do not audit attempts to make a TCP connection to msnp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_msnp_client_packets" lineno="77771">
<summary>
Send msnp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_msnp_client_packets" lineno="77790">
<summary>
Do not audit attempts to send msnp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_msnp_client_packets" lineno="77809">
<summary>
Receive msnp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_msnp_client_packets" lineno="77828">
<summary>
Do not audit attempts to receive msnp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_msnp_client_packets" lineno="77847">
<summary>
Send and receive msnp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_msnp_client_packets" lineno="77863">
<summary>
Do not audit attempts to send and receive msnp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_msnp_client_packets" lineno="77878">
<summary>
Relabel packets to msnp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_msnp_server_packets" lineno="77898">
<summary>
Send msnp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_msnp_server_packets" lineno="77917">
<summary>
Do not audit attempts to send msnp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_msnp_server_packets" lineno="77936">
<summary>
Receive msnp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_msnp_server_packets" lineno="77955">
<summary>
Do not audit attempts to receive msnp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_msnp_server_packets" lineno="77974">
<summary>
Send and receive msnp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_msnp_server_packets" lineno="77990">
<summary>
Do not audit attempts to send and receive msnp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_msnp_server_packets" lineno="78005">
<summary>
Relabel packets to msnp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mssql_port" lineno="78027">
<summary>
Send and receive TCP traffic on the mssql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mssql_port" lineno="78046">
<summary>
Send UDP traffic on the mssql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mssql_port" lineno="78065">
<summary>
Do not audit attempts to send UDP traffic on the mssql port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mssql_port" lineno="78084">
<summary>
Receive UDP traffic on the mssql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mssql_port" lineno="78103">
<summary>
Do not audit attempts to receive UDP traffic on the mssql port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mssql_port" lineno="78122">
<summary>
Send and receive UDP traffic on the mssql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mssql_port" lineno="78139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mssql port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mssql_port" lineno="78155">
<summary>
Bind TCP sockets to the mssql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mssql_port" lineno="78175">
<summary>
Bind UDP sockets to the mssql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mssql_port" lineno="78195">
<summary>
Do not audit attempts to sbind to mssql port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mssql_port" lineno="78214">
<summary>
Make a TCP connection to the mssql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mssql_port" lineno="78231">
<summary>
Do not audit attempts to make a TCP connection to mssql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mssql_client_packets" lineno="78251">
<summary>
Send mssql_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mssql_client_packets" lineno="78270">
<summary>
Do not audit attempts to send mssql_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mssql_client_packets" lineno="78289">
<summary>
Receive mssql_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mssql_client_packets" lineno="78308">
<summary>
Do not audit attempts to receive mssql_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mssql_client_packets" lineno="78327">
<summary>
Send and receive mssql_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mssql_client_packets" lineno="78343">
<summary>
Do not audit attempts to send and receive mssql_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mssql_client_packets" lineno="78358">
<summary>
Relabel packets to mssql_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mssql_server_packets" lineno="78378">
<summary>
Send mssql_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mssql_server_packets" lineno="78397">
<summary>
Do not audit attempts to send mssql_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mssql_server_packets" lineno="78416">
<summary>
Receive mssql_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mssql_server_packets" lineno="78435">
<summary>
Do not audit attempts to receive mssql_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mssql_server_packets" lineno="78454">
<summary>
Send and receive mssql_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mssql_server_packets" lineno="78470">
<summary>
Do not audit attempts to send and receive mssql_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mssql_server_packets" lineno="78485">
<summary>
Relabel packets to mssql_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ms_streaming_port" lineno="78507">
<summary>
Send and receive TCP traffic on the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ms_streaming_port" lineno="78526">
<summary>
Send UDP traffic on the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ms_streaming_port" lineno="78545">
<summary>
Do not audit attempts to send UDP traffic on the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ms_streaming_port" lineno="78564">
<summary>
Receive UDP traffic on the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ms_streaming_port" lineno="78583">
<summary>
Do not audit attempts to receive UDP traffic on the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ms_streaming_port" lineno="78602">
<summary>
Send and receive UDP traffic on the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ms_streaming_port" lineno="78619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ms_streaming_port" lineno="78635">
<summary>
Bind TCP sockets to the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ms_streaming_port" lineno="78655">
<summary>
Bind UDP sockets to the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ms_streaming_port" lineno="78675">
<summary>
Do not audit attempts to sbind to ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ms_streaming_port" lineno="78694">
<summary>
Make a TCP connection to the ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ms_streaming_port" lineno="78711">
<summary>
Do not audit attempts to make a TCP connection to ms_streaming port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ms_streaming_client_packets" lineno="78731">
<summary>
Send ms_streaming_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ms_streaming_client_packets" lineno="78750">
<summary>
Do not audit attempts to send ms_streaming_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ms_streaming_client_packets" lineno="78769">
<summary>
Receive ms_streaming_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ms_streaming_client_packets" lineno="78788">
<summary>
Do not audit attempts to receive ms_streaming_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ms_streaming_client_packets" lineno="78807">
<summary>
Send and receive ms_streaming_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ms_streaming_client_packets" lineno="78823">
<summary>
Do not audit attempts to send and receive ms_streaming_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ms_streaming_client_packets" lineno="78838">
<summary>
Relabel packets to ms_streaming_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ms_streaming_server_packets" lineno="78858">
<summary>
Send ms_streaming_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ms_streaming_server_packets" lineno="78877">
<summary>
Do not audit attempts to send ms_streaming_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ms_streaming_server_packets" lineno="78896">
<summary>
Receive ms_streaming_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ms_streaming_server_packets" lineno="78915">
<summary>
Do not audit attempts to receive ms_streaming_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ms_streaming_server_packets" lineno="78934">
<summary>
Send and receive ms_streaming_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ms_streaming_server_packets" lineno="78950">
<summary>
Do not audit attempts to send and receive ms_streaming_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ms_streaming_server_packets" lineno="78965">
<summary>
Relabel packets to ms_streaming_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_munin_port" lineno="78987">
<summary>
Send and receive TCP traffic on the munin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_munin_port" lineno="79006">
<summary>
Send UDP traffic on the munin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_munin_port" lineno="79025">
<summary>
Do not audit attempts to send UDP traffic on the munin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_munin_port" lineno="79044">
<summary>
Receive UDP traffic on the munin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_munin_port" lineno="79063">
<summary>
Do not audit attempts to receive UDP traffic on the munin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_munin_port" lineno="79082">
<summary>
Send and receive UDP traffic on the munin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_munin_port" lineno="79099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the munin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_munin_port" lineno="79115">
<summary>
Bind TCP sockets to the munin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_munin_port" lineno="79135">
<summary>
Bind UDP sockets to the munin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_munin_port" lineno="79155">
<summary>
Do not audit attempts to sbind to munin port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_munin_port" lineno="79174">
<summary>
Make a TCP connection to the munin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_munin_port" lineno="79191">
<summary>
Do not audit attempts to make a TCP connection to munin port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_munin_client_packets" lineno="79211">
<summary>
Send munin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_munin_client_packets" lineno="79230">
<summary>
Do not audit attempts to send munin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_munin_client_packets" lineno="79249">
<summary>
Receive munin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_munin_client_packets" lineno="79268">
<summary>
Do not audit attempts to receive munin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_munin_client_packets" lineno="79287">
<summary>
Send and receive munin_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_munin_client_packets" lineno="79303">
<summary>
Do not audit attempts to send and receive munin_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_munin_client_packets" lineno="79318">
<summary>
Relabel packets to munin_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_munin_server_packets" lineno="79338">
<summary>
Send munin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_munin_server_packets" lineno="79357">
<summary>
Do not audit attempts to send munin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_munin_server_packets" lineno="79376">
<summary>
Receive munin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_munin_server_packets" lineno="79395">
<summary>
Do not audit attempts to receive munin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_munin_server_packets" lineno="79414">
<summary>
Send and receive munin_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_munin_server_packets" lineno="79430">
<summary>
Do not audit attempts to send and receive munin_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_munin_server_packets" lineno="79445">
<summary>
Relabel packets to munin_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mxi_port" lineno="79467">
<summary>
Send and receive TCP traffic on the mxi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mxi_port" lineno="79486">
<summary>
Send UDP traffic on the mxi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mxi_port" lineno="79505">
<summary>
Do not audit attempts to send UDP traffic on the mxi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mxi_port" lineno="79524">
<summary>
Receive UDP traffic on the mxi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mxi_port" lineno="79543">
<summary>
Do not audit attempts to receive UDP traffic on the mxi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mxi_port" lineno="79562">
<summary>
Send and receive UDP traffic on the mxi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mxi_port" lineno="79579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mxi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mxi_port" lineno="79595">
<summary>
Bind TCP sockets to the mxi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mxi_port" lineno="79615">
<summary>
Bind UDP sockets to the mxi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mxi_port" lineno="79635">
<summary>
Do not audit attempts to sbind to mxi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mxi_port" lineno="79654">
<summary>
Make a TCP connection to the mxi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mxi_port" lineno="79671">
<summary>
Do not audit attempts to make a TCP connection to mxi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mxi_client_packets" lineno="79691">
<summary>
Send mxi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mxi_client_packets" lineno="79710">
<summary>
Do not audit attempts to send mxi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mxi_client_packets" lineno="79729">
<summary>
Receive mxi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mxi_client_packets" lineno="79748">
<summary>
Do not audit attempts to receive mxi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mxi_client_packets" lineno="79767">
<summary>
Send and receive mxi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mxi_client_packets" lineno="79783">
<summary>
Do not audit attempts to send and receive mxi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mxi_client_packets" lineno="79798">
<summary>
Relabel packets to mxi_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mxi_server_packets" lineno="79818">
<summary>
Send mxi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mxi_server_packets" lineno="79837">
<summary>
Do not audit attempts to send mxi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mxi_server_packets" lineno="79856">
<summary>
Receive mxi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mxi_server_packets" lineno="79875">
<summary>
Do not audit attempts to receive mxi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mxi_server_packets" lineno="79894">
<summary>
Send and receive mxi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mxi_server_packets" lineno="79910">
<summary>
Do not audit attempts to send and receive mxi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mxi_server_packets" lineno="79925">
<summary>
Relabel packets to mxi_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mysqld_port" lineno="79947">
<summary>
Send and receive TCP traffic on the mysqld port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mysqld_port" lineno="79966">
<summary>
Send UDP traffic on the mysqld port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mysqld_port" lineno="79985">
<summary>
Do not audit attempts to send UDP traffic on the mysqld port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mysqld_port" lineno="80004">
<summary>
Receive UDP traffic on the mysqld port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mysqld_port" lineno="80023">
<summary>
Do not audit attempts to receive UDP traffic on the mysqld port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mysqld_port" lineno="80042">
<summary>
Send and receive UDP traffic on the mysqld port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mysqld_port" lineno="80059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mysqld port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mysqld_port" lineno="80075">
<summary>
Bind TCP sockets to the mysqld port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mysqld_port" lineno="80095">
<summary>
Bind UDP sockets to the mysqld port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mysqld_port" lineno="80115">
<summary>
Do not audit attempts to sbind to mysqld port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mysqld_port" lineno="80134">
<summary>
Make a TCP connection to the mysqld port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mysqld_port" lineno="80151">
<summary>
Do not audit attempts to make a TCP connection to mysqld port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mysqld_client_packets" lineno="80171">
<summary>
Send mysqld_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mysqld_client_packets" lineno="80190">
<summary>
Do not audit attempts to send mysqld_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mysqld_client_packets" lineno="80209">
<summary>
Receive mysqld_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mysqld_client_packets" lineno="80228">
<summary>
Do not audit attempts to receive mysqld_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mysqld_client_packets" lineno="80247">
<summary>
Send and receive mysqld_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mysqld_client_packets" lineno="80263">
<summary>
Do not audit attempts to send and receive mysqld_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mysqld_client_packets" lineno="80278">
<summary>
Relabel packets to mysqld_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mysqld_server_packets" lineno="80298">
<summary>
Send mysqld_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mysqld_server_packets" lineno="80317">
<summary>
Do not audit attempts to send mysqld_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mysqld_server_packets" lineno="80336">
<summary>
Receive mysqld_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mysqld_server_packets" lineno="80355">
<summary>
Do not audit attempts to receive mysqld_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mysqld_server_packets" lineno="80374">
<summary>
Send and receive mysqld_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mysqld_server_packets" lineno="80390">
<summary>
Do not audit attempts to send and receive mysqld_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mysqld_server_packets" lineno="80405">
<summary>
Relabel packets to mysqld_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mysqlmanagerd_port" lineno="80427">
<summary>
Send and receive TCP traffic on the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mysqlmanagerd_port" lineno="80446">
<summary>
Send UDP traffic on the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mysqlmanagerd_port" lineno="80465">
<summary>
Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mysqlmanagerd_port" lineno="80484">
<summary>
Receive UDP traffic on the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mysqlmanagerd_port" lineno="80503">
<summary>
Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mysqlmanagerd_port" lineno="80522">
<summary>
Send and receive UDP traffic on the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port" lineno="80539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mysqlmanagerd_port" lineno="80555">
<summary>
Bind TCP sockets to the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mysqlmanagerd_port" lineno="80575">
<summary>
Bind UDP sockets to the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mysqlmanagerd_port" lineno="80595">
<summary>
Do not audit attempts to sbind to mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mysqlmanagerd_port" lineno="80614">
<summary>
Make a TCP connection to the mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mysqlmanagerd_port" lineno="80631">
<summary>
Do not audit attempts to make a TCP connection to mysqlmanagerd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mysqlmanagerd_client_packets" lineno="80651">
<summary>
Send mysqlmanagerd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mysqlmanagerd_client_packets" lineno="80670">
<summary>
Do not audit attempts to send mysqlmanagerd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mysqlmanagerd_client_packets" lineno="80689">
<summary>
Receive mysqlmanagerd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mysqlmanagerd_client_packets" lineno="80708">
<summary>
Do not audit attempts to receive mysqlmanagerd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mysqlmanagerd_client_packets" lineno="80727">
<summary>
Send and receive mysqlmanagerd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets" lineno="80743">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mysqlmanagerd_client_packets" lineno="80758">
<summary>
Relabel packets to mysqlmanagerd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mysqlmanagerd_server_packets" lineno="80778">
<summary>
Send mysqlmanagerd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mysqlmanagerd_server_packets" lineno="80797">
<summary>
Do not audit attempts to send mysqlmanagerd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mysqlmanagerd_server_packets" lineno="80816">
<summary>
Receive mysqlmanagerd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mysqlmanagerd_server_packets" lineno="80835">
<summary>
Do not audit attempts to receive mysqlmanagerd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mysqlmanagerd_server_packets" lineno="80854">
<summary>
Send and receive mysqlmanagerd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets" lineno="80870">
<summary>
Do not audit attempts to send and receive mysqlmanagerd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mysqlmanagerd_server_packets" lineno="80885">
<summary>
Relabel packets to mysqlmanagerd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_mythtv_port" lineno="80907">
<summary>
Send and receive TCP traffic on the mythtv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_mythtv_port" lineno="80926">
<summary>
Send UDP traffic on the mythtv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_mythtv_port" lineno="80945">
<summary>
Do not audit attempts to send UDP traffic on the mythtv port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_mythtv_port" lineno="80964">
<summary>
Receive UDP traffic on the mythtv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_mythtv_port" lineno="80983">
<summary>
Do not audit attempts to receive UDP traffic on the mythtv port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_mythtv_port" lineno="81002">
<summary>
Send and receive UDP traffic on the mythtv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_mythtv_port" lineno="81019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the mythtv port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_mythtv_port" lineno="81035">
<summary>
Bind TCP sockets to the mythtv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_mythtv_port" lineno="81055">
<summary>
Bind UDP sockets to the mythtv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_mythtv_port" lineno="81075">
<summary>
Do not audit attempts to sbind to mythtv port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_mythtv_port" lineno="81094">
<summary>
Make a TCP connection to the mythtv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_mythtv_port" lineno="81111">
<summary>
Do not audit attempts to make a TCP connection to mythtv port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mythtv_client_packets" lineno="81131">
<summary>
Send mythtv_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mythtv_client_packets" lineno="81150">
<summary>
Do not audit attempts to send mythtv_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mythtv_client_packets" lineno="81169">
<summary>
Receive mythtv_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mythtv_client_packets" lineno="81188">
<summary>
Do not audit attempts to receive mythtv_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mythtv_client_packets" lineno="81207">
<summary>
Send and receive mythtv_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mythtv_client_packets" lineno="81223">
<summary>
Do not audit attempts to send and receive mythtv_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mythtv_client_packets" lineno="81238">
<summary>
Relabel packets to mythtv_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_mythtv_server_packets" lineno="81258">
<summary>
Send mythtv_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_mythtv_server_packets" lineno="81277">
<summary>
Do not audit attempts to send mythtv_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_mythtv_server_packets" lineno="81296">
<summary>
Receive mythtv_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_mythtv_server_packets" lineno="81315">
<summary>
Do not audit attempts to receive mythtv_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_mythtv_server_packets" lineno="81334">
<summary>
Send and receive mythtv_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_mythtv_server_packets" lineno="81350">
<summary>
Do not audit attempts to send and receive mythtv_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_mythtv_server_packets" lineno="81365">
<summary>
Relabel packets to mythtv_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_nessus_port" lineno="81387">
<summary>
Send and receive TCP traffic on the nessus port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_nessus_port" lineno="81406">
<summary>
Send UDP traffic on the nessus port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_nessus_port" lineno="81425">
<summary>
Do not audit attempts to send UDP traffic on the nessus port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_nessus_port" lineno="81444">
<summary>
Receive UDP traffic on the nessus port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_nessus_port" lineno="81463">
<summary>
Do not audit attempts to receive UDP traffic on the nessus port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_nessus_port" lineno="81482">
<summary>
Send and receive UDP traffic on the nessus port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_nessus_port" lineno="81499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nessus port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_nessus_port" lineno="81515">
<summary>
Bind TCP sockets to the nessus port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_nessus_port" lineno="81535">
<summary>
Bind UDP sockets to the nessus port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_nessus_port" lineno="81555">
<summary>
Do not audit attempts to sbind to nessus port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_nessus_port" lineno="81574">
<summary>
Make a TCP connection to the nessus port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_nessus_port" lineno="81591">
<summary>
Do not audit attempts to make a TCP connection to nessus port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nessus_client_packets" lineno="81611">
<summary>
Send nessus_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nessus_client_packets" lineno="81630">
<summary>
Do not audit attempts to send nessus_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nessus_client_packets" lineno="81649">
<summary>
Receive nessus_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nessus_client_packets" lineno="81668">
<summary>
Do not audit attempts to receive nessus_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nessus_client_packets" lineno="81687">
<summary>
Send and receive nessus_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nessus_client_packets" lineno="81703">
<summary>
Do not audit attempts to send and receive nessus_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nessus_client_packets" lineno="81718">
<summary>
Relabel packets to nessus_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nessus_server_packets" lineno="81738">
<summary>
Send nessus_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nessus_server_packets" lineno="81757">
<summary>
Do not audit attempts to send nessus_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nessus_server_packets" lineno="81776">
<summary>
Receive nessus_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nessus_server_packets" lineno="81795">
<summary>
Do not audit attempts to receive nessus_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nessus_server_packets" lineno="81814">
<summary>
Send and receive nessus_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nessus_server_packets" lineno="81830">
<summary>
Do not audit attempts to send and receive nessus_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nessus_server_packets" lineno="81845">
<summary>
Relabel packets to nessus_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_netport_port" lineno="81867">
<summary>
Send and receive TCP traffic on the netport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_netport_port" lineno="81886">
<summary>
Send UDP traffic on the netport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_netport_port" lineno="81905">
<summary>
Do not audit attempts to send UDP traffic on the netport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_netport_port" lineno="81924">
<summary>
Receive UDP traffic on the netport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_netport_port" lineno="81943">
<summary>
Do not audit attempts to receive UDP traffic on the netport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_netport_port" lineno="81962">
<summary>
Send and receive UDP traffic on the netport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_netport_port" lineno="81979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the netport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_netport_port" lineno="81995">
<summary>
Bind TCP sockets to the netport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_netport_port" lineno="82015">
<summary>
Bind UDP sockets to the netport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_netport_port" lineno="82035">
<summary>
Do not audit attempts to sbind to netport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_netport_port" lineno="82054">
<summary>
Make a TCP connection to the netport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_netport_port" lineno="82071">
<summary>
Do not audit attempts to make a TCP connection to netport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_netport_client_packets" lineno="82091">
<summary>
Send netport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_netport_client_packets" lineno="82110">
<summary>
Do not audit attempts to send netport_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_netport_client_packets" lineno="82129">
<summary>
Receive netport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_netport_client_packets" lineno="82148">
<summary>
Do not audit attempts to receive netport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_netport_client_packets" lineno="82167">
<summary>
Send and receive netport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_netport_client_packets" lineno="82183">
<summary>
Do not audit attempts to send and receive netport_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_netport_client_packets" lineno="82198">
<summary>
Relabel packets to netport_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_netport_server_packets" lineno="82218">
<summary>
Send netport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_netport_server_packets" lineno="82237">
<summary>
Do not audit attempts to send netport_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_netport_server_packets" lineno="82256">
<summary>
Receive netport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_netport_server_packets" lineno="82275">
<summary>
Do not audit attempts to receive netport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_netport_server_packets" lineno="82294">
<summary>
Send and receive netport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_netport_server_packets" lineno="82310">
<summary>
Do not audit attempts to send and receive netport_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_netport_server_packets" lineno="82325">
<summary>
Relabel packets to netport_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_netsupport_port" lineno="82347">
<summary>
Send and receive TCP traffic on the netsupport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_netsupport_port" lineno="82366">
<summary>
Send UDP traffic on the netsupport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_netsupport_port" lineno="82385">
<summary>
Do not audit attempts to send UDP traffic on the netsupport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_netsupport_port" lineno="82404">
<summary>
Receive UDP traffic on the netsupport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_netsupport_port" lineno="82423">
<summary>
Do not audit attempts to receive UDP traffic on the netsupport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_netsupport_port" lineno="82442">
<summary>
Send and receive UDP traffic on the netsupport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_netsupport_port" lineno="82459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the netsupport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_netsupport_port" lineno="82475">
<summary>
Bind TCP sockets to the netsupport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_netsupport_port" lineno="82495">
<summary>
Bind UDP sockets to the netsupport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_netsupport_port" lineno="82515">
<summary>
Do not audit attempts to sbind to netsupport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_netsupport_port" lineno="82534">
<summary>
Make a TCP connection to the netsupport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_netsupport_port" lineno="82551">
<summary>
Do not audit attempts to make a TCP connection to netsupport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_netsupport_client_packets" lineno="82571">
<summary>
Send netsupport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_netsupport_client_packets" lineno="82590">
<summary>
Do not audit attempts to send netsupport_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_netsupport_client_packets" lineno="82609">
<summary>
Receive netsupport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_netsupport_client_packets" lineno="82628">
<summary>
Do not audit attempts to receive netsupport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_netsupport_client_packets" lineno="82647">
<summary>
Send and receive netsupport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_netsupport_client_packets" lineno="82663">
<summary>
Do not audit attempts to send and receive netsupport_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_netsupport_client_packets" lineno="82678">
<summary>
Relabel packets to netsupport_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_netsupport_server_packets" lineno="82698">
<summary>
Send netsupport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_netsupport_server_packets" lineno="82717">
<summary>
Do not audit attempts to send netsupport_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_netsupport_server_packets" lineno="82736">
<summary>
Receive netsupport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_netsupport_server_packets" lineno="82755">
<summary>
Do not audit attempts to receive netsupport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_netsupport_server_packets" lineno="82774">
<summary>
Send and receive netsupport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_netsupport_server_packets" lineno="82790">
<summary>
Do not audit attempts to send and receive netsupport_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_netsupport_server_packets" lineno="82805">
<summary>
Relabel packets to netsupport_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_nfs_port" lineno="82827">
<summary>
Send and receive TCP traffic on the nfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_nfs_port" lineno="82846">
<summary>
Send UDP traffic on the nfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_nfs_port" lineno="82865">
<summary>
Do not audit attempts to send UDP traffic on the nfs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_nfs_port" lineno="82884">
<summary>
Receive UDP traffic on the nfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_nfs_port" lineno="82903">
<summary>
Do not audit attempts to receive UDP traffic on the nfs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_nfs_port" lineno="82922">
<summary>
Send and receive UDP traffic on the nfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_nfs_port" lineno="82939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nfs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_nfs_port" lineno="82955">
<summary>
Bind TCP sockets to the nfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_nfs_port" lineno="82975">
<summary>
Bind UDP sockets to the nfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_nfs_port" lineno="82995">
<summary>
Do not audit attempts to sbind to nfs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_nfs_port" lineno="83014">
<summary>
Make a TCP connection to the nfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_nfs_port" lineno="83031">
<summary>
Do not audit attempts to make a TCP connection to nfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nfs_client_packets" lineno="83051">
<summary>
Send nfs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nfs_client_packets" lineno="83070">
<summary>
Do not audit attempts to send nfs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nfs_client_packets" lineno="83089">
<summary>
Receive nfs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nfs_client_packets" lineno="83108">
<summary>
Do not audit attempts to receive nfs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nfs_client_packets" lineno="83127">
<summary>
Send and receive nfs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nfs_client_packets" lineno="83143">
<summary>
Do not audit attempts to send and receive nfs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nfs_client_packets" lineno="83158">
<summary>
Relabel packets to nfs_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nfs_server_packets" lineno="83178">
<summary>
Send nfs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nfs_server_packets" lineno="83197">
<summary>
Do not audit attempts to send nfs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nfs_server_packets" lineno="83216">
<summary>
Receive nfs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nfs_server_packets" lineno="83235">
<summary>
Do not audit attempts to receive nfs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nfs_server_packets" lineno="83254">
<summary>
Send and receive nfs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nfs_server_packets" lineno="83270">
<summary>
Do not audit attempts to send and receive nfs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nfs_server_packets" lineno="83285">
<summary>
Relabel packets to nfs_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_nmbd_port" lineno="83307">
<summary>
Send and receive TCP traffic on the nmbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_nmbd_port" lineno="83326">
<summary>
Send UDP traffic on the nmbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_nmbd_port" lineno="83345">
<summary>
Do not audit attempts to send UDP traffic on the nmbd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_nmbd_port" lineno="83364">
<summary>
Receive UDP traffic on the nmbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_nmbd_port" lineno="83383">
<summary>
Do not audit attempts to receive UDP traffic on the nmbd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_nmbd_port" lineno="83402">
<summary>
Send and receive UDP traffic on the nmbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_nmbd_port" lineno="83419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nmbd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_nmbd_port" lineno="83435">
<summary>
Bind TCP sockets to the nmbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_nmbd_port" lineno="83455">
<summary>
Bind UDP sockets to the nmbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_nmbd_port" lineno="83475">
<summary>
Do not audit attempts to sbind to nmbd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_nmbd_port" lineno="83494">
<summary>
Make a TCP connection to the nmbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_nmbd_port" lineno="83511">
<summary>
Do not audit attempts to make a TCP connection to nmbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nmbd_client_packets" lineno="83531">
<summary>
Send nmbd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nmbd_client_packets" lineno="83550">
<summary>
Do not audit attempts to send nmbd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nmbd_client_packets" lineno="83569">
<summary>
Receive nmbd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nmbd_client_packets" lineno="83588">
<summary>
Do not audit attempts to receive nmbd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nmbd_client_packets" lineno="83607">
<summary>
Send and receive nmbd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nmbd_client_packets" lineno="83623">
<summary>
Do not audit attempts to send and receive nmbd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nmbd_client_packets" lineno="83638">
<summary>
Relabel packets to nmbd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nmbd_server_packets" lineno="83658">
<summary>
Send nmbd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nmbd_server_packets" lineno="83677">
<summary>
Do not audit attempts to send nmbd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nmbd_server_packets" lineno="83696">
<summary>
Receive nmbd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nmbd_server_packets" lineno="83715">
<summary>
Do not audit attempts to receive nmbd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nmbd_server_packets" lineno="83734">
<summary>
Send and receive nmbd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nmbd_server_packets" lineno="83750">
<summary>
Do not audit attempts to send and receive nmbd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nmbd_server_packets" lineno="83765">
<summary>
Relabel packets to nmbd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_nmea_port" lineno="83787">
<summary>
Send and receive TCP traffic on the nmea port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_nmea_port" lineno="83806">
<summary>
Send UDP traffic on the nmea port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_nmea_port" lineno="83825">
<summary>
Do not audit attempts to send UDP traffic on the nmea port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_nmea_port" lineno="83844">
<summary>
Receive UDP traffic on the nmea port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_nmea_port" lineno="83863">
<summary>
Do not audit attempts to receive UDP traffic on the nmea port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_nmea_port" lineno="83882">
<summary>
Send and receive UDP traffic on the nmea port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_nmea_port" lineno="83899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nmea port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_nmea_port" lineno="83915">
<summary>
Bind TCP sockets to the nmea port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_nmea_port" lineno="83935">
<summary>
Bind UDP sockets to the nmea port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_nmea_port" lineno="83955">
<summary>
Do not audit attempts to sbind to nmea port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_nmea_port" lineno="83974">
<summary>
Make a TCP connection to the nmea port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_nmea_port" lineno="83991">
<summary>
Do not audit attempts to make a TCP connection to nmea port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nmea_client_packets" lineno="84011">
<summary>
Send nmea_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nmea_client_packets" lineno="84030">
<summary>
Do not audit attempts to send nmea_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nmea_client_packets" lineno="84049">
<summary>
Receive nmea_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nmea_client_packets" lineno="84068">
<summary>
Do not audit attempts to receive nmea_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nmea_client_packets" lineno="84087">
<summary>
Send and receive nmea_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nmea_client_packets" lineno="84103">
<summary>
Do not audit attempts to send and receive nmea_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nmea_client_packets" lineno="84118">
<summary>
Relabel packets to nmea_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nmea_server_packets" lineno="84138">
<summary>
Send nmea_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nmea_server_packets" lineno="84157">
<summary>
Do not audit attempts to send nmea_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nmea_server_packets" lineno="84176">
<summary>
Receive nmea_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nmea_server_packets" lineno="84195">
<summary>
Do not audit attempts to receive nmea_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nmea_server_packets" lineno="84214">
<summary>
Send and receive nmea_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nmea_server_packets" lineno="84230">
<summary>
Do not audit attempts to send and receive nmea_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nmea_server_packets" lineno="84245">
<summary>
Relabel packets to nmea_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_nodejs_debug_port" lineno="84267">
<summary>
Send and receive TCP traffic on the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_nodejs_debug_port" lineno="84286">
<summary>
Send UDP traffic on the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_nodejs_debug_port" lineno="84305">
<summary>
Do not audit attempts to send UDP traffic on the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_nodejs_debug_port" lineno="84324">
<summary>
Receive UDP traffic on the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_nodejs_debug_port" lineno="84343">
<summary>
Do not audit attempts to receive UDP traffic on the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_nodejs_debug_port" lineno="84362">
<summary>
Send and receive UDP traffic on the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_nodejs_debug_port" lineno="84379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_nodejs_debug_port" lineno="84395">
<summary>
Bind TCP sockets to the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_nodejs_debug_port" lineno="84415">
<summary>
Bind UDP sockets to the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_nodejs_debug_port" lineno="84435">
<summary>
Do not audit attempts to sbind to nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_nodejs_debug_port" lineno="84454">
<summary>
Make a TCP connection to the nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_nodejs_debug_port" lineno="84471">
<summary>
Do not audit attempts to make a TCP connection to nodejs_debug port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nodejs_debug_client_packets" lineno="84491">
<summary>
Send nodejs_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nodejs_debug_client_packets" lineno="84510">
<summary>
Do not audit attempts to send nodejs_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nodejs_debug_client_packets" lineno="84529">
<summary>
Receive nodejs_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nodejs_debug_client_packets" lineno="84548">
<summary>
Do not audit attempts to receive nodejs_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nodejs_debug_client_packets" lineno="84567">
<summary>
Send and receive nodejs_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nodejs_debug_client_packets" lineno="84583">
<summary>
Do not audit attempts to send and receive nodejs_debug_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nodejs_debug_client_packets" lineno="84598">
<summary>
Relabel packets to nodejs_debug_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nodejs_debug_server_packets" lineno="84618">
<summary>
Send nodejs_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nodejs_debug_server_packets" lineno="84637">
<summary>
Do not audit attempts to send nodejs_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nodejs_debug_server_packets" lineno="84656">
<summary>
Receive nodejs_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nodejs_debug_server_packets" lineno="84675">
<summary>
Do not audit attempts to receive nodejs_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nodejs_debug_server_packets" lineno="84694">
<summary>
Send and receive nodejs_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nodejs_debug_server_packets" lineno="84710">
<summary>
Do not audit attempts to send and receive nodejs_debug_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nodejs_debug_server_packets" lineno="84725">
<summary>
Relabel packets to nodejs_debug_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_nsca_port" lineno="84747">
<summary>
Send and receive TCP traffic on the nsca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_nsca_port" lineno="84766">
<summary>
Send UDP traffic on the nsca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_nsca_port" lineno="84785">
<summary>
Do not audit attempts to send UDP traffic on the nsca port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_nsca_port" lineno="84804">
<summary>
Receive UDP traffic on the nsca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_nsca_port" lineno="84823">
<summary>
Do not audit attempts to receive UDP traffic on the nsca port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_nsca_port" lineno="84842">
<summary>
Send and receive UDP traffic on the nsca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_nsca_port" lineno="84859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nsca port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_nsca_port" lineno="84875">
<summary>
Bind TCP sockets to the nsca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_nsca_port" lineno="84895">
<summary>
Bind UDP sockets to the nsca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_nsca_port" lineno="84915">
<summary>
Do not audit attempts to sbind to nsca port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_nsca_port" lineno="84934">
<summary>
Make a TCP connection to the nsca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_nsca_port" lineno="84951">
<summary>
Do not audit attempts to make a TCP connection to nsca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nsca_client_packets" lineno="84971">
<summary>
Send nsca_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nsca_client_packets" lineno="84990">
<summary>
Do not audit attempts to send nsca_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nsca_client_packets" lineno="85009">
<summary>
Receive nsca_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nsca_client_packets" lineno="85028">
<summary>
Do not audit attempts to receive nsca_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nsca_client_packets" lineno="85047">
<summary>
Send and receive nsca_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nsca_client_packets" lineno="85063">
<summary>
Do not audit attempts to send and receive nsca_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nsca_client_packets" lineno="85078">
<summary>
Relabel packets to nsca_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nsca_server_packets" lineno="85098">
<summary>
Send nsca_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nsca_server_packets" lineno="85117">
<summary>
Do not audit attempts to send nsca_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nsca_server_packets" lineno="85136">
<summary>
Receive nsca_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nsca_server_packets" lineno="85155">
<summary>
Do not audit attempts to receive nsca_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nsca_server_packets" lineno="85174">
<summary>
Send and receive nsca_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nsca_server_packets" lineno="85190">
<summary>
Do not audit attempts to send and receive nsca_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nsca_server_packets" lineno="85205">
<summary>
Relabel packets to nsca_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ntop_port" lineno="85227">
<summary>
Send and receive TCP traffic on the ntop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ntop_port" lineno="85246">
<summary>
Send UDP traffic on the ntop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ntop_port" lineno="85265">
<summary>
Do not audit attempts to send UDP traffic on the ntop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ntop_port" lineno="85284">
<summary>
Receive UDP traffic on the ntop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ntop_port" lineno="85303">
<summary>
Do not audit attempts to receive UDP traffic on the ntop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ntop_port" lineno="85322">
<summary>
Send and receive UDP traffic on the ntop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ntop_port" lineno="85339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ntop_port" lineno="85355">
<summary>
Bind TCP sockets to the ntop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ntop_port" lineno="85375">
<summary>
Bind UDP sockets to the ntop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ntop_port" lineno="85395">
<summary>
Do not audit attempts to sbind to ntop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ntop_port" lineno="85414">
<summary>
Make a TCP connection to the ntop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ntop_port" lineno="85431">
<summary>
Do not audit attempts to make a TCP connection to ntop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ntop_client_packets" lineno="85451">
<summary>
Send ntop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ntop_client_packets" lineno="85470">
<summary>
Do not audit attempts to send ntop_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ntop_client_packets" lineno="85489">
<summary>
Receive ntop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ntop_client_packets" lineno="85508">
<summary>
Do not audit attempts to receive ntop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ntop_client_packets" lineno="85527">
<summary>
Send and receive ntop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ntop_client_packets" lineno="85543">
<summary>
Do not audit attempts to send and receive ntop_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ntop_client_packets" lineno="85558">
<summary>
Relabel packets to ntop_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ntop_server_packets" lineno="85578">
<summary>
Send ntop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ntop_server_packets" lineno="85597">
<summary>
Do not audit attempts to send ntop_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ntop_server_packets" lineno="85616">
<summary>
Receive ntop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ntop_server_packets" lineno="85635">
<summary>
Do not audit attempts to receive ntop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ntop_server_packets" lineno="85654">
<summary>
Send and receive ntop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ntop_server_packets" lineno="85670">
<summary>
Do not audit attempts to send and receive ntop_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ntop_server_packets" lineno="85685">
<summary>
Relabel packets to ntop_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ntp_port" lineno="85707">
<summary>
Send and receive TCP traffic on the ntp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ntp_port" lineno="85726">
<summary>
Send UDP traffic on the ntp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ntp_port" lineno="85745">
<summary>
Do not audit attempts to send UDP traffic on the ntp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ntp_port" lineno="85764">
<summary>
Receive UDP traffic on the ntp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ntp_port" lineno="85783">
<summary>
Do not audit attempts to receive UDP traffic on the ntp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ntp_port" lineno="85802">
<summary>
Send and receive UDP traffic on the ntp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ntp_port" lineno="85819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ntp_port" lineno="85835">
<summary>
Bind TCP sockets to the ntp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ntp_port" lineno="85855">
<summary>
Bind UDP sockets to the ntp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ntp_port" lineno="85875">
<summary>
Do not audit attempts to sbind to ntp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ntp_port" lineno="85894">
<summary>
Make a TCP connection to the ntp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ntp_port" lineno="85911">
<summary>
Do not audit attempts to make a TCP connection to ntp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ntp_client_packets" lineno="85931">
<summary>
Send ntp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ntp_client_packets" lineno="85950">
<summary>
Do not audit attempts to send ntp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ntp_client_packets" lineno="85969">
<summary>
Receive ntp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ntp_client_packets" lineno="85988">
<summary>
Do not audit attempts to receive ntp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ntp_client_packets" lineno="86007">
<summary>
Send and receive ntp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ntp_client_packets" lineno="86023">
<summary>
Do not audit attempts to send and receive ntp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ntp_client_packets" lineno="86038">
<summary>
Relabel packets to ntp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ntp_server_packets" lineno="86058">
<summary>
Send ntp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ntp_server_packets" lineno="86077">
<summary>
Do not audit attempts to send ntp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ntp_server_packets" lineno="86096">
<summary>
Receive ntp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ntp_server_packets" lineno="86115">
<summary>
Do not audit attempts to receive ntp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ntp_server_packets" lineno="86134">
<summary>
Send and receive ntp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ntp_server_packets" lineno="86150">
<summary>
Do not audit attempts to send and receive ntp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ntp_server_packets" lineno="86165">
<summary>
Relabel packets to ntp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ntske_port" lineno="86187">
<summary>
Send and receive TCP traffic on the ntske port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ntske_port" lineno="86206">
<summary>
Send UDP traffic on the ntske port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ntske_port" lineno="86225">
<summary>
Do not audit attempts to send UDP traffic on the ntske port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ntske_port" lineno="86244">
<summary>
Receive UDP traffic on the ntske port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ntske_port" lineno="86263">
<summary>
Do not audit attempts to receive UDP traffic on the ntske port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ntske_port" lineno="86282">
<summary>
Send and receive UDP traffic on the ntske port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ntske_port" lineno="86299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ntske port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ntske_port" lineno="86315">
<summary>
Bind TCP sockets to the ntske port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ntske_port" lineno="86335">
<summary>
Bind UDP sockets to the ntske port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ntske_port" lineno="86355">
<summary>
Do not audit attempts to sbind to ntske port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ntske_port" lineno="86374">
<summary>
Make a TCP connection to the ntske port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ntske_port" lineno="86391">
<summary>
Do not audit attempts to make a TCP connection to ntske port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ntske_client_packets" lineno="86411">
<summary>
Send ntske_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ntske_client_packets" lineno="86430">
<summary>
Do not audit attempts to send ntske_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ntske_client_packets" lineno="86449">
<summary>
Receive ntske_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ntske_client_packets" lineno="86468">
<summary>
Do not audit attempts to receive ntske_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ntske_client_packets" lineno="86487">
<summary>
Send and receive ntske_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ntske_client_packets" lineno="86503">
<summary>
Do not audit attempts to send and receive ntske_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ntske_client_packets" lineno="86518">
<summary>
Relabel packets to ntske_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ntske_server_packets" lineno="86538">
<summary>
Send ntske_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ntske_server_packets" lineno="86557">
<summary>
Do not audit attempts to send ntske_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ntske_server_packets" lineno="86576">
<summary>
Receive ntske_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ntske_server_packets" lineno="86595">
<summary>
Do not audit attempts to receive ntske_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ntske_server_packets" lineno="86614">
<summary>
Send and receive ntske_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ntske_server_packets" lineno="86630">
<summary>
Do not audit attempts to send and receive ntske_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ntske_server_packets" lineno="86645">
<summary>
Relabel packets to ntske_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_oracle_port" lineno="86667">
<summary>
Send and receive TCP traffic on the oracle port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_oracle_port" lineno="86686">
<summary>
Send UDP traffic on the oracle port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_oracle_port" lineno="86705">
<summary>
Do not audit attempts to send UDP traffic on the oracle port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_oracle_port" lineno="86724">
<summary>
Receive UDP traffic on the oracle port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_oracle_port" lineno="86743">
<summary>
Do not audit attempts to receive UDP traffic on the oracle port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_oracle_port" lineno="86762">
<summary>
Send and receive UDP traffic on the oracle port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_oracle_port" lineno="86779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the oracle port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_oracle_port" lineno="86795">
<summary>
Bind TCP sockets to the oracle port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_oracle_port" lineno="86815">
<summary>
Bind UDP sockets to the oracle port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_oracle_port" lineno="86835">
<summary>
Do not audit attempts to sbind to oracle port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_oracle_port" lineno="86854">
<summary>
Make a TCP connection to the oracle port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_oracle_port" lineno="86871">
<summary>
Do not audit attempts to make a TCP connection to oracle port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_oracle_client_packets" lineno="86891">
<summary>
Send oracle_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_oracle_client_packets" lineno="86910">
<summary>
Do not audit attempts to send oracle_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_oracle_client_packets" lineno="86929">
<summary>
Receive oracle_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_oracle_client_packets" lineno="86948">
<summary>
Do not audit attempts to receive oracle_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_oracle_client_packets" lineno="86967">
<summary>
Send and receive oracle_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_oracle_client_packets" lineno="86983">
<summary>
Do not audit attempts to send and receive oracle_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_oracle_client_packets" lineno="86998">
<summary>
Relabel packets to oracle_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_oracle_server_packets" lineno="87018">
<summary>
Send oracle_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_oracle_server_packets" lineno="87037">
<summary>
Do not audit attempts to send oracle_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_oracle_server_packets" lineno="87056">
<summary>
Receive oracle_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_oracle_server_packets" lineno="87075">
<summary>
Do not audit attempts to receive oracle_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_oracle_server_packets" lineno="87094">
<summary>
Send and receive oracle_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_oracle_server_packets" lineno="87110">
<summary>
Do not audit attempts to send and receive oracle_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_oracle_server_packets" lineno="87125">
<summary>
Relabel packets to oracle_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_oa_system_port" lineno="87147">
<summary>
Send and receive TCP traffic on the oa_system port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_oa_system_port" lineno="87166">
<summary>
Send UDP traffic on the oa_system port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_oa_system_port" lineno="87185">
<summary>
Do not audit attempts to send UDP traffic on the oa_system port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_oa_system_port" lineno="87204">
<summary>
Receive UDP traffic on the oa_system port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_oa_system_port" lineno="87223">
<summary>
Do not audit attempts to receive UDP traffic on the oa_system port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_oa_system_port" lineno="87242">
<summary>
Send and receive UDP traffic on the oa_system port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_oa_system_port" lineno="87259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the oa_system port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_oa_system_port" lineno="87275">
<summary>
Bind TCP sockets to the oa_system port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_oa_system_port" lineno="87295">
<summary>
Bind UDP sockets to the oa_system port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_oa_system_port" lineno="87315">
<summary>
Do not audit attempts to sbind to oa_system port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_oa_system_port" lineno="87334">
<summary>
Make a TCP connection to the oa_system port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_oa_system_port" lineno="87351">
<summary>
Do not audit attempts to make a TCP connection to oa_system port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_oa_system_client_packets" lineno="87371">
<summary>
Send oa_system_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_oa_system_client_packets" lineno="87390">
<summary>
Do not audit attempts to send oa_system_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_oa_system_client_packets" lineno="87409">
<summary>
Receive oa_system_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_oa_system_client_packets" lineno="87428">
<summary>
Do not audit attempts to receive oa_system_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_oa_system_client_packets" lineno="87447">
<summary>
Send and receive oa_system_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_oa_system_client_packets" lineno="87463">
<summary>
Do not audit attempts to send and receive oa_system_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_oa_system_client_packets" lineno="87478">
<summary>
Relabel packets to oa_system_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_oa_system_server_packets" lineno="87498">
<summary>
Send oa_system_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_oa_system_server_packets" lineno="87517">
<summary>
Do not audit attempts to send oa_system_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_oa_system_server_packets" lineno="87536">
<summary>
Receive oa_system_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_oa_system_server_packets" lineno="87555">
<summary>
Do not audit attempts to receive oa_system_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_oa_system_server_packets" lineno="87574">
<summary>
Send and receive oa_system_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_oa_system_server_packets" lineno="87590">
<summary>
Do not audit attempts to send and receive oa_system_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_oa_system_server_packets" lineno="87605">
<summary>
Relabel packets to oa_system_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ocsp_port" lineno="87627">
<summary>
Send and receive TCP traffic on the ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ocsp_port" lineno="87646">
<summary>
Send UDP traffic on the ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ocsp_port" lineno="87665">
<summary>
Do not audit attempts to send UDP traffic on the ocsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ocsp_port" lineno="87684">
<summary>
Receive UDP traffic on the ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ocsp_port" lineno="87703">
<summary>
Do not audit attempts to receive UDP traffic on the ocsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ocsp_port" lineno="87722">
<summary>
Send and receive UDP traffic on the ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ocsp_port" lineno="87739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ocsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ocsp_port" lineno="87755">
<summary>
Bind TCP sockets to the ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ocsp_port" lineno="87775">
<summary>
Bind UDP sockets to the ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ocsp_port" lineno="87795">
<summary>
Do not audit attempts to sbind to ocsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ocsp_port" lineno="87814">
<summary>
Make a TCP connection to the ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ocsp_port" lineno="87831">
<summary>
Do not audit attempts to make a TCP connection to ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ocsp_client_packets" lineno="87851">
<summary>
Send ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ocsp_client_packets" lineno="87870">
<summary>
Do not audit attempts to send ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ocsp_client_packets" lineno="87889">
<summary>
Receive ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ocsp_client_packets" lineno="87908">
<summary>
Do not audit attempts to receive ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ocsp_client_packets" lineno="87927">
<summary>
Send and receive ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ocsp_client_packets" lineno="87943">
<summary>
Do not audit attempts to send and receive ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ocsp_client_packets" lineno="87958">
<summary>
Relabel packets to ocsp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ocsp_server_packets" lineno="87978">
<summary>
Send ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ocsp_server_packets" lineno="87997">
<summary>
Do not audit attempts to send ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ocsp_server_packets" lineno="88016">
<summary>
Receive ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ocsp_server_packets" lineno="88035">
<summary>
Do not audit attempts to receive ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ocsp_server_packets" lineno="88054">
<summary>
Send and receive ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ocsp_server_packets" lineno="88070">
<summary>
Do not audit attempts to send and receive ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ocsp_server_packets" lineno="88085">
<summary>
Relabel packets to ocsp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_opendnssec_port" lineno="88107">
<summary>
Send and receive TCP traffic on the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_opendnssec_port" lineno="88126">
<summary>
Send UDP traffic on the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_opendnssec_port" lineno="88145">
<summary>
Do not audit attempts to send UDP traffic on the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_opendnssec_port" lineno="88164">
<summary>
Receive UDP traffic on the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_opendnssec_port" lineno="88183">
<summary>
Do not audit attempts to receive UDP traffic on the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_opendnssec_port" lineno="88202">
<summary>
Send and receive UDP traffic on the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_opendnssec_port" lineno="88219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_opendnssec_port" lineno="88235">
<summary>
Bind TCP sockets to the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_opendnssec_port" lineno="88255">
<summary>
Bind UDP sockets to the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_opendnssec_port" lineno="88275">
<summary>
Do not audit attempts to sbind to opendnssec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_opendnssec_port" lineno="88294">
<summary>
Make a TCP connection to the opendnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_opendnssec_port" lineno="88311">
<summary>
Do not audit attempts to make a TCP connection to opendnssec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_opendnssec_client_packets" lineno="88331">
<summary>
Send opendnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_opendnssec_client_packets" lineno="88350">
<summary>
Do not audit attempts to send opendnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_opendnssec_client_packets" lineno="88369">
<summary>
Receive opendnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_opendnssec_client_packets" lineno="88388">
<summary>
Do not audit attempts to receive opendnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_opendnssec_client_packets" lineno="88407">
<summary>
Send and receive opendnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_opendnssec_client_packets" lineno="88423">
<summary>
Do not audit attempts to send and receive opendnssec_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_opendnssec_client_packets" lineno="88438">
<summary>
Relabel packets to opendnssec_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_opendnssec_server_packets" lineno="88458">
<summary>
Send opendnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_opendnssec_server_packets" lineno="88477">
<summary>
Do not audit attempts to send opendnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_opendnssec_server_packets" lineno="88496">
<summary>
Receive opendnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_opendnssec_server_packets" lineno="88515">
<summary>
Do not audit attempts to receive opendnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_opendnssec_server_packets" lineno="88534">
<summary>
Send and receive opendnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_opendnssec_server_packets" lineno="88550">
<summary>
Do not audit attempts to send and receive opendnssec_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_opendnssec_server_packets" lineno="88565">
<summary>
Relabel packets to opendnssec_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_openflow_port" lineno="88587">
<summary>
Send and receive TCP traffic on the openflow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_openflow_port" lineno="88606">
<summary>
Send UDP traffic on the openflow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_openflow_port" lineno="88625">
<summary>
Do not audit attempts to send UDP traffic on the openflow port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_openflow_port" lineno="88644">
<summary>
Receive UDP traffic on the openflow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_openflow_port" lineno="88663">
<summary>
Do not audit attempts to receive UDP traffic on the openflow port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_openflow_port" lineno="88682">
<summary>
Send and receive UDP traffic on the openflow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_openflow_port" lineno="88699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openflow port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_openflow_port" lineno="88715">
<summary>
Bind TCP sockets to the openflow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_openflow_port" lineno="88735">
<summary>
Bind UDP sockets to the openflow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_openflow_port" lineno="88755">
<summary>
Do not audit attempts to sbind to openflow port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_openflow_port" lineno="88774">
<summary>
Make a TCP connection to the openflow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_openflow_port" lineno="88791">
<summary>
Do not audit attempts to make a TCP connection to openflow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openflow_client_packets" lineno="88811">
<summary>
Send openflow_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openflow_client_packets" lineno="88830">
<summary>
Do not audit attempts to send openflow_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openflow_client_packets" lineno="88849">
<summary>
Receive openflow_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openflow_client_packets" lineno="88868">
<summary>
Do not audit attempts to receive openflow_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openflow_client_packets" lineno="88887">
<summary>
Send and receive openflow_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openflow_client_packets" lineno="88903">
<summary>
Do not audit attempts to send and receive openflow_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openflow_client_packets" lineno="88918">
<summary>
Relabel packets to openflow_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openflow_server_packets" lineno="88938">
<summary>
Send openflow_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openflow_server_packets" lineno="88957">
<summary>
Do not audit attempts to send openflow_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openflow_server_packets" lineno="88976">
<summary>
Receive openflow_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openflow_server_packets" lineno="88995">
<summary>
Do not audit attempts to receive openflow_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openflow_server_packets" lineno="89014">
<summary>
Send and receive openflow_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openflow_server_packets" lineno="89030">
<summary>
Do not audit attempts to send and receive openflow_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openflow_server_packets" lineno="89045">
<summary>
Relabel packets to openflow_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_openhpid_port" lineno="89067">
<summary>
Send and receive TCP traffic on the openhpid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_openhpid_port" lineno="89086">
<summary>
Send UDP traffic on the openhpid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_openhpid_port" lineno="89105">
<summary>
Do not audit attempts to send UDP traffic on the openhpid port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_openhpid_port" lineno="89124">
<summary>
Receive UDP traffic on the openhpid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_openhpid_port" lineno="89143">
<summary>
Do not audit attempts to receive UDP traffic on the openhpid port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_openhpid_port" lineno="89162">
<summary>
Send and receive UDP traffic on the openhpid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_openhpid_port" lineno="89179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openhpid port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_openhpid_port" lineno="89195">
<summary>
Bind TCP sockets to the openhpid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_openhpid_port" lineno="89215">
<summary>
Bind UDP sockets to the openhpid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_openhpid_port" lineno="89235">
<summary>
Do not audit attempts to sbind to openhpid port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_openhpid_port" lineno="89254">
<summary>
Make a TCP connection to the openhpid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_openhpid_port" lineno="89271">
<summary>
Do not audit attempts to make a TCP connection to openhpid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openhpid_client_packets" lineno="89291">
<summary>
Send openhpid_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openhpid_client_packets" lineno="89310">
<summary>
Do not audit attempts to send openhpid_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openhpid_client_packets" lineno="89329">
<summary>
Receive openhpid_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openhpid_client_packets" lineno="89348">
<summary>
Do not audit attempts to receive openhpid_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openhpid_client_packets" lineno="89367">
<summary>
Send and receive openhpid_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openhpid_client_packets" lineno="89383">
<summary>
Do not audit attempts to send and receive openhpid_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openhpid_client_packets" lineno="89398">
<summary>
Relabel packets to openhpid_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openhpid_server_packets" lineno="89418">
<summary>
Send openhpid_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openhpid_server_packets" lineno="89437">
<summary>
Do not audit attempts to send openhpid_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openhpid_server_packets" lineno="89456">
<summary>
Receive openhpid_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openhpid_server_packets" lineno="89475">
<summary>
Do not audit attempts to receive openhpid_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openhpid_server_packets" lineno="89494">
<summary>
Send and receive openhpid_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openhpid_server_packets" lineno="89510">
<summary>
Do not audit attempts to send and receive openhpid_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openhpid_server_packets" lineno="89525">
<summary>
Relabel packets to openhpid_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_openvpn_port" lineno="89547">
<summary>
Send and receive TCP traffic on the openvpn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_openvpn_port" lineno="89566">
<summary>
Send UDP traffic on the openvpn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_openvpn_port" lineno="89585">
<summary>
Do not audit attempts to send UDP traffic on the openvpn port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_openvpn_port" lineno="89604">
<summary>
Receive UDP traffic on the openvpn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_openvpn_port" lineno="89623">
<summary>
Do not audit attempts to receive UDP traffic on the openvpn port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_openvpn_port" lineno="89642">
<summary>
Send and receive UDP traffic on the openvpn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_openvpn_port" lineno="89659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openvpn port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_openvpn_port" lineno="89675">
<summary>
Bind TCP sockets to the openvpn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_openvpn_port" lineno="89695">
<summary>
Bind UDP sockets to the openvpn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_openvpn_port" lineno="89715">
<summary>
Do not audit attempts to sbind to openvpn port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_openvpn_port" lineno="89734">
<summary>
Make a TCP connection to the openvpn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_openvpn_port" lineno="89751">
<summary>
Do not audit attempts to make a TCP connection to openvpn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openvpn_client_packets" lineno="89771">
<summary>
Send openvpn_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openvpn_client_packets" lineno="89790">
<summary>
Do not audit attempts to send openvpn_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openvpn_client_packets" lineno="89809">
<summary>
Receive openvpn_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openvpn_client_packets" lineno="89828">
<summary>
Do not audit attempts to receive openvpn_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openvpn_client_packets" lineno="89847">
<summary>
Send and receive openvpn_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openvpn_client_packets" lineno="89863">
<summary>
Do not audit attempts to send and receive openvpn_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openvpn_client_packets" lineno="89878">
<summary>
Relabel packets to openvpn_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openvpn_server_packets" lineno="89898">
<summary>
Send openvpn_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openvpn_server_packets" lineno="89917">
<summary>
Do not audit attempts to send openvpn_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openvpn_server_packets" lineno="89936">
<summary>
Receive openvpn_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openvpn_server_packets" lineno="89955">
<summary>
Do not audit attempts to receive openvpn_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openvpn_server_packets" lineno="89974">
<summary>
Send and receive openvpn_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openvpn_server_packets" lineno="89990">
<summary>
Do not audit attempts to send and receive openvpn_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openvpn_server_packets" lineno="90005">
<summary>
Relabel packets to openvpn_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_openvswitch_port" lineno="90027">
<summary>
Send and receive TCP traffic on the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_openvswitch_port" lineno="90046">
<summary>
Send UDP traffic on the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_openvswitch_port" lineno="90065">
<summary>
Do not audit attempts to send UDP traffic on the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_openvswitch_port" lineno="90084">
<summary>
Receive UDP traffic on the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_openvswitch_port" lineno="90103">
<summary>
Do not audit attempts to receive UDP traffic on the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_openvswitch_port" lineno="90122">
<summary>
Send and receive UDP traffic on the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_openvswitch_port" lineno="90139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_openvswitch_port" lineno="90155">
<summary>
Bind TCP sockets to the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_openvswitch_port" lineno="90175">
<summary>
Bind UDP sockets to the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_openvswitch_port" lineno="90195">
<summary>
Do not audit attempts to sbind to openvswitch port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_openvswitch_port" lineno="90214">
<summary>
Make a TCP connection to the openvswitch port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_openvswitch_port" lineno="90231">
<summary>
Do not audit attempts to make a TCP connection to openvswitch port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openvswitch_client_packets" lineno="90251">
<summary>
Send openvswitch_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openvswitch_client_packets" lineno="90270">
<summary>
Do not audit attempts to send openvswitch_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openvswitch_client_packets" lineno="90289">
<summary>
Receive openvswitch_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openvswitch_client_packets" lineno="90308">
<summary>
Do not audit attempts to receive openvswitch_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openvswitch_client_packets" lineno="90327">
<summary>
Send and receive openvswitch_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openvswitch_client_packets" lineno="90343">
<summary>
Do not audit attempts to send and receive openvswitch_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openvswitch_client_packets" lineno="90358">
<summary>
Relabel packets to openvswitch_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openvswitch_server_packets" lineno="90378">
<summary>
Send openvswitch_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openvswitch_server_packets" lineno="90397">
<summary>
Do not audit attempts to send openvswitch_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openvswitch_server_packets" lineno="90416">
<summary>
Receive openvswitch_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openvswitch_server_packets" lineno="90435">
<summary>
Do not audit attempts to receive openvswitch_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openvswitch_server_packets" lineno="90454">
<summary>
Send and receive openvswitch_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openvswitch_server_packets" lineno="90470">
<summary>
Do not audit attempts to send and receive openvswitch_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openvswitch_server_packets" lineno="90485">
<summary>
Relabel packets to openvswitch_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_openqa_port" lineno="90507">
<summary>
Send and receive TCP traffic on the openqa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_openqa_port" lineno="90526">
<summary>
Send UDP traffic on the openqa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_openqa_port" lineno="90545">
<summary>
Do not audit attempts to send UDP traffic on the openqa port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_openqa_port" lineno="90564">
<summary>
Receive UDP traffic on the openqa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_openqa_port" lineno="90583">
<summary>
Do not audit attempts to receive UDP traffic on the openqa port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_openqa_port" lineno="90602">
<summary>
Send and receive UDP traffic on the openqa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_openqa_port" lineno="90619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openqa port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_openqa_port" lineno="90635">
<summary>
Bind TCP sockets to the openqa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_openqa_port" lineno="90655">
<summary>
Bind UDP sockets to the openqa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_openqa_port" lineno="90675">
<summary>
Do not audit attempts to sbind to openqa port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_openqa_port" lineno="90694">
<summary>
Make a TCP connection to the openqa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_openqa_port" lineno="90711">
<summary>
Do not audit attempts to make a TCP connection to openqa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openqa_client_packets" lineno="90731">
<summary>
Send openqa_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openqa_client_packets" lineno="90750">
<summary>
Do not audit attempts to send openqa_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openqa_client_packets" lineno="90769">
<summary>
Receive openqa_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openqa_client_packets" lineno="90788">
<summary>
Do not audit attempts to receive openqa_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openqa_client_packets" lineno="90807">
<summary>
Send and receive openqa_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openqa_client_packets" lineno="90823">
<summary>
Do not audit attempts to send and receive openqa_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openqa_client_packets" lineno="90838">
<summary>
Relabel packets to openqa_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openqa_server_packets" lineno="90858">
<summary>
Send openqa_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openqa_server_packets" lineno="90877">
<summary>
Do not audit attempts to send openqa_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openqa_server_packets" lineno="90896">
<summary>
Receive openqa_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openqa_server_packets" lineno="90915">
<summary>
Do not audit attempts to receive openqa_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openqa_server_packets" lineno="90934">
<summary>
Send and receive openqa_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openqa_server_packets" lineno="90950">
<summary>
Do not audit attempts to send and receive openqa_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openqa_server_packets" lineno="90965">
<summary>
Relabel packets to openqa_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_openqa_websockets_port" lineno="90987">
<summary>
Send and receive TCP traffic on the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_openqa_websockets_port" lineno="91006">
<summary>
Send UDP traffic on the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_openqa_websockets_port" lineno="91025">
<summary>
Do not audit attempts to send UDP traffic on the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_openqa_websockets_port" lineno="91044">
<summary>
Receive UDP traffic on the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_openqa_websockets_port" lineno="91063">
<summary>
Do not audit attempts to receive UDP traffic on the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_openqa_websockets_port" lineno="91082">
<summary>
Send and receive UDP traffic on the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_openqa_websockets_port" lineno="91099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_openqa_websockets_port" lineno="91115">
<summary>
Bind TCP sockets to the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_openqa_websockets_port" lineno="91135">
<summary>
Bind UDP sockets to the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_openqa_websockets_port" lineno="91155">
<summary>
Do not audit attempts to sbind to openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_openqa_websockets_port" lineno="91174">
<summary>
Make a TCP connection to the openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_openqa_websockets_port" lineno="91191">
<summary>
Do not audit attempts to make a TCP connection to openqa_websockets port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openqa_websockets_client_packets" lineno="91211">
<summary>
Send openqa_websockets_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openqa_websockets_client_packets" lineno="91230">
<summary>
Do not audit attempts to send openqa_websockets_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openqa_websockets_client_packets" lineno="91249">
<summary>
Receive openqa_websockets_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openqa_websockets_client_packets" lineno="91268">
<summary>
Do not audit attempts to receive openqa_websockets_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openqa_websockets_client_packets" lineno="91287">
<summary>
Send and receive openqa_websockets_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openqa_websockets_client_packets" lineno="91303">
<summary>
Do not audit attempts to send and receive openqa_websockets_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openqa_websockets_client_packets" lineno="91318">
<summary>
Relabel packets to openqa_websockets_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openqa_websockets_server_packets" lineno="91338">
<summary>
Send openqa_websockets_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openqa_websockets_server_packets" lineno="91357">
<summary>
Do not audit attempts to send openqa_websockets_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openqa_websockets_server_packets" lineno="91376">
<summary>
Receive openqa_websockets_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openqa_websockets_server_packets" lineno="91395">
<summary>
Do not audit attempts to receive openqa_websockets_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openqa_websockets_server_packets" lineno="91414">
<summary>
Send and receive openqa_websockets_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openqa_websockets_server_packets" lineno="91430">
<summary>
Do not audit attempts to send and receive openqa_websockets_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openqa_websockets_server_packets" lineno="91445">
<summary>
Relabel packets to openqa_websockets_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_openqa_liveview_port" lineno="91467">
<summary>
Send and receive TCP traffic on the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_openqa_liveview_port" lineno="91486">
<summary>
Send UDP traffic on the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_openqa_liveview_port" lineno="91505">
<summary>
Do not audit attempts to send UDP traffic on the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_openqa_liveview_port" lineno="91524">
<summary>
Receive UDP traffic on the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_openqa_liveview_port" lineno="91543">
<summary>
Do not audit attempts to receive UDP traffic on the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_openqa_liveview_port" lineno="91562">
<summary>
Send and receive UDP traffic on the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_openqa_liveview_port" lineno="91579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_openqa_liveview_port" lineno="91595">
<summary>
Bind TCP sockets to the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_openqa_liveview_port" lineno="91615">
<summary>
Bind UDP sockets to the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_openqa_liveview_port" lineno="91635">
<summary>
Do not audit attempts to sbind to openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_openqa_liveview_port" lineno="91654">
<summary>
Make a TCP connection to the openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_openqa_liveview_port" lineno="91671">
<summary>
Do not audit attempts to make a TCP connection to openqa_liveview port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openqa_liveview_client_packets" lineno="91691">
<summary>
Send openqa_liveview_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openqa_liveview_client_packets" lineno="91710">
<summary>
Do not audit attempts to send openqa_liveview_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openqa_liveview_client_packets" lineno="91729">
<summary>
Receive openqa_liveview_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openqa_liveview_client_packets" lineno="91748">
<summary>
Do not audit attempts to receive openqa_liveview_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openqa_liveview_client_packets" lineno="91767">
<summary>
Send and receive openqa_liveview_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openqa_liveview_client_packets" lineno="91783">
<summary>
Do not audit attempts to send and receive openqa_liveview_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openqa_liveview_client_packets" lineno="91798">
<summary>
Relabel packets to openqa_liveview_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_openqa_liveview_server_packets" lineno="91818">
<summary>
Send openqa_liveview_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_openqa_liveview_server_packets" lineno="91837">
<summary>
Do not audit attempts to send openqa_liveview_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_openqa_liveview_server_packets" lineno="91856">
<summary>
Receive openqa_liveview_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_openqa_liveview_server_packets" lineno="91875">
<summary>
Do not audit attempts to receive openqa_liveview_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_openqa_liveview_server_packets" lineno="91894">
<summary>
Send and receive openqa_liveview_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_openqa_liveview_server_packets" lineno="91910">
<summary>
Do not audit attempts to send and receive openqa_liveview_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_openqa_liveview_server_packets" lineno="91925">
<summary>
Relabel packets to openqa_liveview_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_osapi_compute_port" lineno="91947">
<summary>
Send and receive TCP traffic on the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_osapi_compute_port" lineno="91966">
<summary>
Send UDP traffic on the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_osapi_compute_port" lineno="91985">
<summary>
Do not audit attempts to send UDP traffic on the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_osapi_compute_port" lineno="92004">
<summary>
Receive UDP traffic on the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_osapi_compute_port" lineno="92023">
<summary>
Do not audit attempts to receive UDP traffic on the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_osapi_compute_port" lineno="92042">
<summary>
Send and receive UDP traffic on the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_osapi_compute_port" lineno="92059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_osapi_compute_port" lineno="92075">
<summary>
Bind TCP sockets to the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_osapi_compute_port" lineno="92095">
<summary>
Bind UDP sockets to the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_osapi_compute_port" lineno="92115">
<summary>
Do not audit attempts to sbind to osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_osapi_compute_port" lineno="92134">
<summary>
Make a TCP connection to the osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_osapi_compute_port" lineno="92151">
<summary>
Do not audit attempts to make a TCP connection to osapi_compute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_osapi_compute_client_packets" lineno="92171">
<summary>
Send osapi_compute_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_osapi_compute_client_packets" lineno="92190">
<summary>
Do not audit attempts to send osapi_compute_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_osapi_compute_client_packets" lineno="92209">
<summary>
Receive osapi_compute_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_osapi_compute_client_packets" lineno="92228">
<summary>
Do not audit attempts to receive osapi_compute_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_osapi_compute_client_packets" lineno="92247">
<summary>
Send and receive osapi_compute_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_osapi_compute_client_packets" lineno="92263">
<summary>
Do not audit attempts to send and receive osapi_compute_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_osapi_compute_client_packets" lineno="92278">
<summary>
Relabel packets to osapi_compute_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_osapi_compute_server_packets" lineno="92298">
<summary>
Send osapi_compute_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_osapi_compute_server_packets" lineno="92317">
<summary>
Do not audit attempts to send osapi_compute_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_osapi_compute_server_packets" lineno="92336">
<summary>
Receive osapi_compute_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_osapi_compute_server_packets" lineno="92355">
<summary>
Do not audit attempts to receive osapi_compute_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_osapi_compute_server_packets" lineno="92374">
<summary>
Send and receive osapi_compute_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_osapi_compute_server_packets" lineno="92390">
<summary>
Do not audit attempts to send and receive osapi_compute_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_osapi_compute_server_packets" lineno="92405">
<summary>
Relabel packets to osapi_compute_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ovsdb_port" lineno="92427">
<summary>
Send and receive TCP traffic on the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ovsdb_port" lineno="92446">
<summary>
Send UDP traffic on the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ovsdb_port" lineno="92465">
<summary>
Do not audit attempts to send UDP traffic on the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ovsdb_port" lineno="92484">
<summary>
Receive UDP traffic on the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ovsdb_port" lineno="92503">
<summary>
Do not audit attempts to receive UDP traffic on the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ovsdb_port" lineno="92522">
<summary>
Send and receive UDP traffic on the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ovsdb_port" lineno="92539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ovsdb_port" lineno="92555">
<summary>
Bind TCP sockets to the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ovsdb_port" lineno="92575">
<summary>
Bind UDP sockets to the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ovsdb_port" lineno="92595">
<summary>
Do not audit attempts to sbind to ovsdb port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ovsdb_port" lineno="92614">
<summary>
Make a TCP connection to the ovsdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ovsdb_port" lineno="92631">
<summary>
Do not audit attempts to make a TCP connection to ovsdb port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ovsdb_client_packets" lineno="92651">
<summary>
Send ovsdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ovsdb_client_packets" lineno="92670">
<summary>
Do not audit attempts to send ovsdb_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ovsdb_client_packets" lineno="92689">
<summary>
Receive ovsdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ovsdb_client_packets" lineno="92708">
<summary>
Do not audit attempts to receive ovsdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ovsdb_client_packets" lineno="92727">
<summary>
Send and receive ovsdb_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ovsdb_client_packets" lineno="92743">
<summary>
Do not audit attempts to send and receive ovsdb_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ovsdb_client_packets" lineno="92758">
<summary>
Relabel packets to ovsdb_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ovsdb_server_packets" lineno="92778">
<summary>
Send ovsdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ovsdb_server_packets" lineno="92797">
<summary>
Do not audit attempts to send ovsdb_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ovsdb_server_packets" lineno="92816">
<summary>
Receive ovsdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ovsdb_server_packets" lineno="92835">
<summary>
Do not audit attempts to receive ovsdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ovsdb_server_packets" lineno="92854">
<summary>
Send and receive ovsdb_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ovsdb_server_packets" lineno="92870">
<summary>
Do not audit attempts to send and receive ovsdb_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ovsdb_server_packets" lineno="92885">
<summary>
Relabel packets to ovsdb_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pdps_port" lineno="92907">
<summary>
Send and receive TCP traffic on the pdps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pdps_port" lineno="92926">
<summary>
Send UDP traffic on the pdps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pdps_port" lineno="92945">
<summary>
Do not audit attempts to send UDP traffic on the pdps port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pdps_port" lineno="92964">
<summary>
Receive UDP traffic on the pdps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pdps_port" lineno="92983">
<summary>
Do not audit attempts to receive UDP traffic on the pdps port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pdps_port" lineno="93002">
<summary>
Send and receive UDP traffic on the pdps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pdps_port" lineno="93019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pdps port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pdps_port" lineno="93035">
<summary>
Bind TCP sockets to the pdps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pdps_port" lineno="93055">
<summary>
Bind UDP sockets to the pdps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pdps_port" lineno="93075">
<summary>
Do not audit attempts to sbind to pdps port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pdps_port" lineno="93094">
<summary>
Make a TCP connection to the pdps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pdps_port" lineno="93111">
<summary>
Do not audit attempts to make a TCP connection to pdps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pdps_client_packets" lineno="93131">
<summary>
Send pdps_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pdps_client_packets" lineno="93150">
<summary>
Do not audit attempts to send pdps_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pdps_client_packets" lineno="93169">
<summary>
Receive pdps_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pdps_client_packets" lineno="93188">
<summary>
Do not audit attempts to receive pdps_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pdps_client_packets" lineno="93207">
<summary>
Send and receive pdps_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pdps_client_packets" lineno="93223">
<summary>
Do not audit attempts to send and receive pdps_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pdps_client_packets" lineno="93238">
<summary>
Relabel packets to pdps_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pdps_server_packets" lineno="93258">
<summary>
Send pdps_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pdps_server_packets" lineno="93277">
<summary>
Do not audit attempts to send pdps_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pdps_server_packets" lineno="93296">
<summary>
Receive pdps_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pdps_server_packets" lineno="93315">
<summary>
Do not audit attempts to receive pdps_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pdps_server_packets" lineno="93334">
<summary>
Send and receive pdps_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pdps_server_packets" lineno="93350">
<summary>
Do not audit attempts to send and receive pdps_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pdps_server_packets" lineno="93365">
<summary>
Relabel packets to pdps_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pegasus_http_port" lineno="93387">
<summary>
Send and receive TCP traffic on the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pegasus_http_port" lineno="93406">
<summary>
Send UDP traffic on the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pegasus_http_port" lineno="93425">
<summary>
Do not audit attempts to send UDP traffic on the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pegasus_http_port" lineno="93444">
<summary>
Receive UDP traffic on the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pegasus_http_port" lineno="93463">
<summary>
Do not audit attempts to receive UDP traffic on the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pegasus_http_port" lineno="93482">
<summary>
Send and receive UDP traffic on the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pegasus_http_port" lineno="93499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pegasus_http_port" lineno="93515">
<summary>
Bind TCP sockets to the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pegasus_http_port" lineno="93535">
<summary>
Bind UDP sockets to the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pegasus_http_port" lineno="93555">
<summary>
Do not audit attempts to sbind to pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pegasus_http_port" lineno="93574">
<summary>
Make a TCP connection to the pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pegasus_http_port" lineno="93591">
<summary>
Do not audit attempts to make a TCP connection to pegasus_http port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pegasus_http_client_packets" lineno="93611">
<summary>
Send pegasus_http_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pegasus_http_client_packets" lineno="93630">
<summary>
Do not audit attempts to send pegasus_http_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pegasus_http_client_packets" lineno="93649">
<summary>
Receive pegasus_http_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pegasus_http_client_packets" lineno="93668">
<summary>
Do not audit attempts to receive pegasus_http_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pegasus_http_client_packets" lineno="93687">
<summary>
Send and receive pegasus_http_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pegasus_http_client_packets" lineno="93703">
<summary>
Do not audit attempts to send and receive pegasus_http_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pegasus_http_client_packets" lineno="93718">
<summary>
Relabel packets to pegasus_http_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pegasus_http_server_packets" lineno="93738">
<summary>
Send pegasus_http_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pegasus_http_server_packets" lineno="93757">
<summary>
Do not audit attempts to send pegasus_http_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pegasus_http_server_packets" lineno="93776">
<summary>
Receive pegasus_http_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pegasus_http_server_packets" lineno="93795">
<summary>
Do not audit attempts to receive pegasus_http_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pegasus_http_server_packets" lineno="93814">
<summary>
Send and receive pegasus_http_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pegasus_http_server_packets" lineno="93830">
<summary>
Do not audit attempts to send and receive pegasus_http_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pegasus_http_server_packets" lineno="93845">
<summary>
Relabel packets to pegasus_http_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pegasus_https_port" lineno="93867">
<summary>
Send and receive TCP traffic on the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pegasus_https_port" lineno="93886">
<summary>
Send UDP traffic on the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pegasus_https_port" lineno="93905">
<summary>
Do not audit attempts to send UDP traffic on the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pegasus_https_port" lineno="93924">
<summary>
Receive UDP traffic on the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pegasus_https_port" lineno="93943">
<summary>
Do not audit attempts to receive UDP traffic on the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pegasus_https_port" lineno="93962">
<summary>
Send and receive UDP traffic on the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pegasus_https_port" lineno="93979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pegasus_https_port" lineno="93995">
<summary>
Bind TCP sockets to the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pegasus_https_port" lineno="94015">
<summary>
Bind UDP sockets to the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pegasus_https_port" lineno="94035">
<summary>
Do not audit attempts to sbind to pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pegasus_https_port" lineno="94054">
<summary>
Make a TCP connection to the pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pegasus_https_port" lineno="94071">
<summary>
Do not audit attempts to make a TCP connection to pegasus_https port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pegasus_https_client_packets" lineno="94091">
<summary>
Send pegasus_https_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pegasus_https_client_packets" lineno="94110">
<summary>
Do not audit attempts to send pegasus_https_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pegasus_https_client_packets" lineno="94129">
<summary>
Receive pegasus_https_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pegasus_https_client_packets" lineno="94148">
<summary>
Do not audit attempts to receive pegasus_https_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pegasus_https_client_packets" lineno="94167">
<summary>
Send and receive pegasus_https_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pegasus_https_client_packets" lineno="94183">
<summary>
Do not audit attempts to send and receive pegasus_https_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pegasus_https_client_packets" lineno="94198">
<summary>
Relabel packets to pegasus_https_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pegasus_https_server_packets" lineno="94218">
<summary>
Send pegasus_https_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pegasus_https_server_packets" lineno="94237">
<summary>
Do not audit attempts to send pegasus_https_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pegasus_https_server_packets" lineno="94256">
<summary>
Receive pegasus_https_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pegasus_https_server_packets" lineno="94275">
<summary>
Do not audit attempts to receive pegasus_https_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pegasus_https_server_packets" lineno="94294">
<summary>
Send and receive pegasus_https_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pegasus_https_server_packets" lineno="94310">
<summary>
Do not audit attempts to send and receive pegasus_https_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pegasus_https_server_packets" lineno="94325">
<summary>
Relabel packets to pegasus_https_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pgpkeyserver_port" lineno="94347">
<summary>
Send and receive TCP traffic on the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pgpkeyserver_port" lineno="94366">
<summary>
Send UDP traffic on the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pgpkeyserver_port" lineno="94385">
<summary>
Do not audit attempts to send UDP traffic on the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pgpkeyserver_port" lineno="94404">
<summary>
Receive UDP traffic on the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pgpkeyserver_port" lineno="94423">
<summary>
Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pgpkeyserver_port" lineno="94442">
<summary>
Send and receive UDP traffic on the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pgpkeyserver_port" lineno="94459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pgpkeyserver_port" lineno="94475">
<summary>
Bind TCP sockets to the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pgpkeyserver_port" lineno="94495">
<summary>
Bind UDP sockets to the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pgpkeyserver_port" lineno="94515">
<summary>
Do not audit attempts to sbind to pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pgpkeyserver_port" lineno="94534">
<summary>
Make a TCP connection to the pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pgpkeyserver_port" lineno="94551">
<summary>
Do not audit attempts to make a TCP connection to pgpkeyserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pgpkeyserver_client_packets" lineno="94571">
<summary>
Send pgpkeyserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pgpkeyserver_client_packets" lineno="94590">
<summary>
Do not audit attempts to send pgpkeyserver_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pgpkeyserver_client_packets" lineno="94609">
<summary>
Receive pgpkeyserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pgpkeyserver_client_packets" lineno="94628">
<summary>
Do not audit attempts to receive pgpkeyserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pgpkeyserver_client_packets" lineno="94647">
<summary>
Send and receive pgpkeyserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_client_packets" lineno="94663">
<summary>
Do not audit attempts to send and receive pgpkeyserver_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pgpkeyserver_client_packets" lineno="94678">
<summary>
Relabel packets to pgpkeyserver_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pgpkeyserver_server_packets" lineno="94698">
<summary>
Send pgpkeyserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pgpkeyserver_server_packets" lineno="94717">
<summary>
Do not audit attempts to send pgpkeyserver_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pgpkeyserver_server_packets" lineno="94736">
<summary>
Receive pgpkeyserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pgpkeyserver_server_packets" lineno="94755">
<summary>
Do not audit attempts to receive pgpkeyserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pgpkeyserver_server_packets" lineno="94774">
<summary>
Send and receive pgpkeyserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pgpkeyserver_server_packets" lineno="94790">
<summary>
Do not audit attempts to send and receive pgpkeyserver_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pgpkeyserver_server_packets" lineno="94805">
<summary>
Relabel packets to pgpkeyserver_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pingd_port" lineno="94827">
<summary>
Send and receive TCP traffic on the pingd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pingd_port" lineno="94846">
<summary>
Send UDP traffic on the pingd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pingd_port" lineno="94865">
<summary>
Do not audit attempts to send UDP traffic on the pingd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pingd_port" lineno="94884">
<summary>
Receive UDP traffic on the pingd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pingd_port" lineno="94903">
<summary>
Do not audit attempts to receive UDP traffic on the pingd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pingd_port" lineno="94922">
<summary>
Send and receive UDP traffic on the pingd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pingd_port" lineno="94939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pingd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pingd_port" lineno="94955">
<summary>
Bind TCP sockets to the pingd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pingd_port" lineno="94975">
<summary>
Bind UDP sockets to the pingd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pingd_port" lineno="94995">
<summary>
Do not audit attempts to sbind to pingd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pingd_port" lineno="95014">
<summary>
Make a TCP connection to the pingd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pingd_port" lineno="95031">
<summary>
Do not audit attempts to make a TCP connection to pingd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pingd_client_packets" lineno="95051">
<summary>
Send pingd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pingd_client_packets" lineno="95070">
<summary>
Do not audit attempts to send pingd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pingd_client_packets" lineno="95089">
<summary>
Receive pingd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pingd_client_packets" lineno="95108">
<summary>
Do not audit attempts to receive pingd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pingd_client_packets" lineno="95127">
<summary>
Send and receive pingd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pingd_client_packets" lineno="95143">
<summary>
Do not audit attempts to send and receive pingd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pingd_client_packets" lineno="95158">
<summary>
Relabel packets to pingd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pingd_server_packets" lineno="95178">
<summary>
Send pingd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pingd_server_packets" lineno="95197">
<summary>
Do not audit attempts to send pingd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pingd_server_packets" lineno="95216">
<summary>
Receive pingd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pingd_server_packets" lineno="95235">
<summary>
Do not audit attempts to receive pingd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pingd_server_packets" lineno="95254">
<summary>
Send and receive pingd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pingd_server_packets" lineno="95270">
<summary>
Do not audit attempts to send and receive pingd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pingd_server_packets" lineno="95285">
<summary>
Relabel packets to pingd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pki_ca_port" lineno="95307">
<summary>
Send and receive TCP traffic on the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pki_ca_port" lineno="95326">
<summary>
Send UDP traffic on the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pki_ca_port" lineno="95345">
<summary>
Do not audit attempts to send UDP traffic on the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pki_ca_port" lineno="95364">
<summary>
Receive UDP traffic on the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pki_ca_port" lineno="95383">
<summary>
Do not audit attempts to receive UDP traffic on the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pki_ca_port" lineno="95402">
<summary>
Send and receive UDP traffic on the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pki_ca_port" lineno="95419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pki_ca_port" lineno="95435">
<summary>
Bind TCP sockets to the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pki_ca_port" lineno="95455">
<summary>
Bind UDP sockets to the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pki_ca_port" lineno="95475">
<summary>
Do not audit attempts to sbind to pki_ca port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pki_ca_port" lineno="95494">
<summary>
Make a TCP connection to the pki_ca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pki_ca_port" lineno="95511">
<summary>
Do not audit attempts to make a TCP connection to pki_ca port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_ca_client_packets" lineno="95531">
<summary>
Send pki_ca_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_ca_client_packets" lineno="95550">
<summary>
Do not audit attempts to send pki_ca_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_ca_client_packets" lineno="95569">
<summary>
Receive pki_ca_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_ca_client_packets" lineno="95588">
<summary>
Do not audit attempts to receive pki_ca_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_ca_client_packets" lineno="95607">
<summary>
Send and receive pki_ca_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_ca_client_packets" lineno="95623">
<summary>
Do not audit attempts to send and receive pki_ca_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_ca_client_packets" lineno="95638">
<summary>
Relabel packets to pki_ca_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_ca_server_packets" lineno="95658">
<summary>
Send pki_ca_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_ca_server_packets" lineno="95677">
<summary>
Do not audit attempts to send pki_ca_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_ca_server_packets" lineno="95696">
<summary>
Receive pki_ca_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_ca_server_packets" lineno="95715">
<summary>
Do not audit attempts to receive pki_ca_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_ca_server_packets" lineno="95734">
<summary>
Send and receive pki_ca_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_ca_server_packets" lineno="95750">
<summary>
Do not audit attempts to send and receive pki_ca_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_ca_server_packets" lineno="95765">
<summary>
Relabel packets to pki_ca_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pki_kra_port" lineno="95787">
<summary>
Send and receive TCP traffic on the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pki_kra_port" lineno="95806">
<summary>
Send UDP traffic on the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pki_kra_port" lineno="95825">
<summary>
Do not audit attempts to send UDP traffic on the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pki_kra_port" lineno="95844">
<summary>
Receive UDP traffic on the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pki_kra_port" lineno="95863">
<summary>
Do not audit attempts to receive UDP traffic on the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pki_kra_port" lineno="95882">
<summary>
Send and receive UDP traffic on the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pki_kra_port" lineno="95899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pki_kra_port" lineno="95915">
<summary>
Bind TCP sockets to the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pki_kra_port" lineno="95935">
<summary>
Bind UDP sockets to the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pki_kra_port" lineno="95955">
<summary>
Do not audit attempts to sbind to pki_kra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pki_kra_port" lineno="95974">
<summary>
Make a TCP connection to the pki_kra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pki_kra_port" lineno="95991">
<summary>
Do not audit attempts to make a TCP connection to pki_kra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_kra_client_packets" lineno="96011">
<summary>
Send pki_kra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_kra_client_packets" lineno="96030">
<summary>
Do not audit attempts to send pki_kra_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_kra_client_packets" lineno="96049">
<summary>
Receive pki_kra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_kra_client_packets" lineno="96068">
<summary>
Do not audit attempts to receive pki_kra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_kra_client_packets" lineno="96087">
<summary>
Send and receive pki_kra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_kra_client_packets" lineno="96103">
<summary>
Do not audit attempts to send and receive pki_kra_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_kra_client_packets" lineno="96118">
<summary>
Relabel packets to pki_kra_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_kra_server_packets" lineno="96138">
<summary>
Send pki_kra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_kra_server_packets" lineno="96157">
<summary>
Do not audit attempts to send pki_kra_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_kra_server_packets" lineno="96176">
<summary>
Receive pki_kra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_kra_server_packets" lineno="96195">
<summary>
Do not audit attempts to receive pki_kra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_kra_server_packets" lineno="96214">
<summary>
Send and receive pki_kra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_kra_server_packets" lineno="96230">
<summary>
Do not audit attempts to send and receive pki_kra_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_kra_server_packets" lineno="96245">
<summary>
Relabel packets to pki_kra_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pki_ocsp_port" lineno="96267">
<summary>
Send and receive TCP traffic on the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pki_ocsp_port" lineno="96286">
<summary>
Send UDP traffic on the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pki_ocsp_port" lineno="96305">
<summary>
Do not audit attempts to send UDP traffic on the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pki_ocsp_port" lineno="96324">
<summary>
Receive UDP traffic on the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pki_ocsp_port" lineno="96343">
<summary>
Do not audit attempts to receive UDP traffic on the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pki_ocsp_port" lineno="96362">
<summary>
Send and receive UDP traffic on the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pki_ocsp_port" lineno="96379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pki_ocsp_port" lineno="96395">
<summary>
Bind TCP sockets to the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pki_ocsp_port" lineno="96415">
<summary>
Bind UDP sockets to the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pki_ocsp_port" lineno="96435">
<summary>
Do not audit attempts to sbind to pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pki_ocsp_port" lineno="96454">
<summary>
Make a TCP connection to the pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pki_ocsp_port" lineno="96471">
<summary>
Do not audit attempts to make a TCP connection to pki_ocsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_ocsp_client_packets" lineno="96491">
<summary>
Send pki_ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_ocsp_client_packets" lineno="96510">
<summary>
Do not audit attempts to send pki_ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_ocsp_client_packets" lineno="96529">
<summary>
Receive pki_ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_ocsp_client_packets" lineno="96548">
<summary>
Do not audit attempts to receive pki_ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_ocsp_client_packets" lineno="96567">
<summary>
Send and receive pki_ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_ocsp_client_packets" lineno="96583">
<summary>
Do not audit attempts to send and receive pki_ocsp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_ocsp_client_packets" lineno="96598">
<summary>
Relabel packets to pki_ocsp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_ocsp_server_packets" lineno="96618">
<summary>
Send pki_ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_ocsp_server_packets" lineno="96637">
<summary>
Do not audit attempts to send pki_ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_ocsp_server_packets" lineno="96656">
<summary>
Receive pki_ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_ocsp_server_packets" lineno="96675">
<summary>
Do not audit attempts to receive pki_ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_ocsp_server_packets" lineno="96694">
<summary>
Send and receive pki_ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_ocsp_server_packets" lineno="96710">
<summary>
Do not audit attempts to send and receive pki_ocsp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_ocsp_server_packets" lineno="96725">
<summary>
Relabel packets to pki_ocsp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pki_tks_port" lineno="96747">
<summary>
Send and receive TCP traffic on the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pki_tks_port" lineno="96766">
<summary>
Send UDP traffic on the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pki_tks_port" lineno="96785">
<summary>
Do not audit attempts to send UDP traffic on the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pki_tks_port" lineno="96804">
<summary>
Receive UDP traffic on the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pki_tks_port" lineno="96823">
<summary>
Do not audit attempts to receive UDP traffic on the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pki_tks_port" lineno="96842">
<summary>
Send and receive UDP traffic on the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pki_tks_port" lineno="96859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pki_tks_port" lineno="96875">
<summary>
Bind TCP sockets to the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pki_tks_port" lineno="96895">
<summary>
Bind UDP sockets to the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pki_tks_port" lineno="96915">
<summary>
Do not audit attempts to sbind to pki_tks port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pki_tks_port" lineno="96934">
<summary>
Make a TCP connection to the pki_tks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pki_tks_port" lineno="96951">
<summary>
Do not audit attempts to make a TCP connection to pki_tks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_tks_client_packets" lineno="96971">
<summary>
Send pki_tks_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_tks_client_packets" lineno="96990">
<summary>
Do not audit attempts to send pki_tks_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_tks_client_packets" lineno="97009">
<summary>
Receive pki_tks_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_tks_client_packets" lineno="97028">
<summary>
Do not audit attempts to receive pki_tks_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_tks_client_packets" lineno="97047">
<summary>
Send and receive pki_tks_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_tks_client_packets" lineno="97063">
<summary>
Do not audit attempts to send and receive pki_tks_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_tks_client_packets" lineno="97078">
<summary>
Relabel packets to pki_tks_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_tks_server_packets" lineno="97098">
<summary>
Send pki_tks_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_tks_server_packets" lineno="97117">
<summary>
Do not audit attempts to send pki_tks_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_tks_server_packets" lineno="97136">
<summary>
Receive pki_tks_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_tks_server_packets" lineno="97155">
<summary>
Do not audit attempts to receive pki_tks_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_tks_server_packets" lineno="97174">
<summary>
Send and receive pki_tks_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_tks_server_packets" lineno="97190">
<summary>
Do not audit attempts to send and receive pki_tks_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_tks_server_packets" lineno="97205">
<summary>
Relabel packets to pki_tks_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pki_ra_port" lineno="97227">
<summary>
Send and receive TCP traffic on the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pki_ra_port" lineno="97246">
<summary>
Send UDP traffic on the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pki_ra_port" lineno="97265">
<summary>
Do not audit attempts to send UDP traffic on the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pki_ra_port" lineno="97284">
<summary>
Receive UDP traffic on the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pki_ra_port" lineno="97303">
<summary>
Do not audit attempts to receive UDP traffic on the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pki_ra_port" lineno="97322">
<summary>
Send and receive UDP traffic on the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pki_ra_port" lineno="97339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pki_ra_port" lineno="97355">
<summary>
Bind TCP sockets to the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pki_ra_port" lineno="97375">
<summary>
Bind UDP sockets to the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pki_ra_port" lineno="97395">
<summary>
Do not audit attempts to sbind to pki_ra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pki_ra_port" lineno="97414">
<summary>
Make a TCP connection to the pki_ra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pki_ra_port" lineno="97431">
<summary>
Do not audit attempts to make a TCP connection to pki_ra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_ra_client_packets" lineno="97451">
<summary>
Send pki_ra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_ra_client_packets" lineno="97470">
<summary>
Do not audit attempts to send pki_ra_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_ra_client_packets" lineno="97489">
<summary>
Receive pki_ra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_ra_client_packets" lineno="97508">
<summary>
Do not audit attempts to receive pki_ra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_ra_client_packets" lineno="97527">
<summary>
Send and receive pki_ra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_ra_client_packets" lineno="97543">
<summary>
Do not audit attempts to send and receive pki_ra_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_ra_client_packets" lineno="97558">
<summary>
Relabel packets to pki_ra_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_ra_server_packets" lineno="97578">
<summary>
Send pki_ra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_ra_server_packets" lineno="97597">
<summary>
Do not audit attempts to send pki_ra_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_ra_server_packets" lineno="97616">
<summary>
Receive pki_ra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_ra_server_packets" lineno="97635">
<summary>
Do not audit attempts to receive pki_ra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_ra_server_packets" lineno="97654">
<summary>
Send and receive pki_ra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_ra_server_packets" lineno="97670">
<summary>
Do not audit attempts to send and receive pki_ra_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_ra_server_packets" lineno="97685">
<summary>
Relabel packets to pki_ra_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pki_tps_port" lineno="97707">
<summary>
Send and receive TCP traffic on the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pki_tps_port" lineno="97726">
<summary>
Send UDP traffic on the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pki_tps_port" lineno="97745">
<summary>
Do not audit attempts to send UDP traffic on the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pki_tps_port" lineno="97764">
<summary>
Receive UDP traffic on the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pki_tps_port" lineno="97783">
<summary>
Do not audit attempts to receive UDP traffic on the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pki_tps_port" lineno="97802">
<summary>
Send and receive UDP traffic on the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pki_tps_port" lineno="97819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pki_tps_port" lineno="97835">
<summary>
Bind TCP sockets to the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pki_tps_port" lineno="97855">
<summary>
Bind UDP sockets to the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pki_tps_port" lineno="97875">
<summary>
Do not audit attempts to sbind to pki_tps port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pki_tps_port" lineno="97894">
<summary>
Make a TCP connection to the pki_tps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pki_tps_port" lineno="97911">
<summary>
Do not audit attempts to make a TCP connection to pki_tps port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_tps_client_packets" lineno="97931">
<summary>
Send pki_tps_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_tps_client_packets" lineno="97950">
<summary>
Do not audit attempts to send pki_tps_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_tps_client_packets" lineno="97969">
<summary>
Receive pki_tps_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_tps_client_packets" lineno="97988">
<summary>
Do not audit attempts to receive pki_tps_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_tps_client_packets" lineno="98007">
<summary>
Send and receive pki_tps_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_tps_client_packets" lineno="98023">
<summary>
Do not audit attempts to send and receive pki_tps_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_tps_client_packets" lineno="98038">
<summary>
Relabel packets to pki_tps_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pki_tps_server_packets" lineno="98058">
<summary>
Send pki_tps_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pki_tps_server_packets" lineno="98077">
<summary>
Do not audit attempts to send pki_tps_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pki_tps_server_packets" lineno="98096">
<summary>
Receive pki_tps_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pki_tps_server_packets" lineno="98115">
<summary>
Do not audit attempts to receive pki_tps_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pki_tps_server_packets" lineno="98134">
<summary>
Send and receive pki_tps_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pki_tps_server_packets" lineno="98150">
<summary>
Do not audit attempts to send and receive pki_tps_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pki_tps_server_packets" lineno="98165">
<summary>
Relabel packets to pki_tps_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pktcable_cops_port" lineno="98187">
<summary>
Send and receive TCP traffic on the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pktcable_cops_port" lineno="98206">
<summary>
Send UDP traffic on the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pktcable_cops_port" lineno="98225">
<summary>
Do not audit attempts to send UDP traffic on the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pktcable_cops_port" lineno="98244">
<summary>
Receive UDP traffic on the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pktcable_cops_port" lineno="98263">
<summary>
Do not audit attempts to receive UDP traffic on the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pktcable_cops_port" lineno="98282">
<summary>
Send and receive UDP traffic on the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pktcable_cops_port" lineno="98299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pktcable_cops_port" lineno="98315">
<summary>
Bind TCP sockets to the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pktcable_cops_port" lineno="98335">
<summary>
Bind UDP sockets to the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pktcable_cops_port" lineno="98355">
<summary>
Do not audit attempts to sbind to pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pktcable_cops_port" lineno="98374">
<summary>
Make a TCP connection to the pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pktcable_cops_port" lineno="98391">
<summary>
Do not audit attempts to make a TCP connection to pktcable_cops port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pktcable_cops_client_packets" lineno="98411">
<summary>
Send pktcable_cops_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pktcable_cops_client_packets" lineno="98430">
<summary>
Do not audit attempts to send pktcable_cops_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pktcable_cops_client_packets" lineno="98449">
<summary>
Receive pktcable_cops_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pktcable_cops_client_packets" lineno="98468">
<summary>
Do not audit attempts to receive pktcable_cops_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pktcable_cops_client_packets" lineno="98487">
<summary>
Send and receive pktcable_cops_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pktcable_cops_client_packets" lineno="98503">
<summary>
Do not audit attempts to send and receive pktcable_cops_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pktcable_cops_client_packets" lineno="98518">
<summary>
Relabel packets to pktcable_cops_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pktcable_cops_server_packets" lineno="98538">
<summary>
Send pktcable_cops_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pktcable_cops_server_packets" lineno="98557">
<summary>
Do not audit attempts to send pktcable_cops_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pktcable_cops_server_packets" lineno="98576">
<summary>
Receive pktcable_cops_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pktcable_cops_server_packets" lineno="98595">
<summary>
Do not audit attempts to receive pktcable_cops_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pktcable_cops_server_packets" lineno="98614">
<summary>
Send and receive pktcable_cops_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pktcable_cops_server_packets" lineno="98630">
<summary>
Do not audit attempts to send and receive pktcable_cops_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pktcable_cops_server_packets" lineno="98645">
<summary>
Relabel packets to pktcable_cops_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pop_port" lineno="98667">
<summary>
Send and receive TCP traffic on the pop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pop_port" lineno="98686">
<summary>
Send UDP traffic on the pop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pop_port" lineno="98705">
<summary>
Do not audit attempts to send UDP traffic on the pop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pop_port" lineno="98724">
<summary>
Receive UDP traffic on the pop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pop_port" lineno="98743">
<summary>
Do not audit attempts to receive UDP traffic on the pop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pop_port" lineno="98762">
<summary>
Send and receive UDP traffic on the pop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pop_port" lineno="98779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pop_port" lineno="98795">
<summary>
Bind TCP sockets to the pop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pop_port" lineno="98815">
<summary>
Bind UDP sockets to the pop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pop_port" lineno="98835">
<summary>
Do not audit attempts to sbind to pop port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pop_port" lineno="98854">
<summary>
Make a TCP connection to the pop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pop_port" lineno="98871">
<summary>
Do not audit attempts to make a TCP connection to pop port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pop_client_packets" lineno="98891">
<summary>
Send pop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pop_client_packets" lineno="98910">
<summary>
Do not audit attempts to send pop_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pop_client_packets" lineno="98929">
<summary>
Receive pop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pop_client_packets" lineno="98948">
<summary>
Do not audit attempts to receive pop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pop_client_packets" lineno="98967">
<summary>
Send and receive pop_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pop_client_packets" lineno="98983">
<summary>
Do not audit attempts to send and receive pop_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pop_client_packets" lineno="98998">
<summary>
Relabel packets to pop_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pop_server_packets" lineno="99018">
<summary>
Send pop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pop_server_packets" lineno="99037">
<summary>
Do not audit attempts to send pop_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pop_server_packets" lineno="99056">
<summary>
Receive pop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pop_server_packets" lineno="99075">
<summary>
Do not audit attempts to receive pop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pop_server_packets" lineno="99094">
<summary>
Send and receive pop_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pop_server_packets" lineno="99110">
<summary>
Do not audit attempts to send and receive pop_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pop_server_packets" lineno="99125">
<summary>
Relabel packets to pop_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_portmap_port" lineno="99147">
<summary>
Send and receive TCP traffic on the portmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_portmap_port" lineno="99166">
<summary>
Send UDP traffic on the portmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_portmap_port" lineno="99185">
<summary>
Do not audit attempts to send UDP traffic on the portmap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_portmap_port" lineno="99204">
<summary>
Receive UDP traffic on the portmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_portmap_port" lineno="99223">
<summary>
Do not audit attempts to receive UDP traffic on the portmap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_portmap_port" lineno="99242">
<summary>
Send and receive UDP traffic on the portmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_portmap_port" lineno="99259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the portmap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_portmap_port" lineno="99275">
<summary>
Bind TCP sockets to the portmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_portmap_port" lineno="99295">
<summary>
Bind UDP sockets to the portmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_portmap_port" lineno="99315">
<summary>
Do not audit attempts to sbind to portmap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_portmap_port" lineno="99334">
<summary>
Make a TCP connection to the portmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_portmap_port" lineno="99351">
<summary>
Do not audit attempts to make a TCP connection to portmap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_portmap_client_packets" lineno="99371">
<summary>
Send portmap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_portmap_client_packets" lineno="99390">
<summary>
Do not audit attempts to send portmap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_portmap_client_packets" lineno="99409">
<summary>
Receive portmap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_portmap_client_packets" lineno="99428">
<summary>
Do not audit attempts to receive portmap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_portmap_client_packets" lineno="99447">
<summary>
Send and receive portmap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_portmap_client_packets" lineno="99463">
<summary>
Do not audit attempts to send and receive portmap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_portmap_client_packets" lineno="99478">
<summary>
Relabel packets to portmap_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_portmap_server_packets" lineno="99498">
<summary>
Send portmap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_portmap_server_packets" lineno="99517">
<summary>
Do not audit attempts to send portmap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_portmap_server_packets" lineno="99536">
<summary>
Receive portmap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_portmap_server_packets" lineno="99555">
<summary>
Do not audit attempts to receive portmap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_portmap_server_packets" lineno="99574">
<summary>
Send and receive portmap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_portmap_server_packets" lineno="99590">
<summary>
Do not audit attempts to send and receive portmap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_portmap_server_packets" lineno="99605">
<summary>
Relabel packets to portmap_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_postfix_policyd_port" lineno="99627">
<summary>
Send and receive TCP traffic on the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_postfix_policyd_port" lineno="99646">
<summary>
Send UDP traffic on the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_postfix_policyd_port" lineno="99665">
<summary>
Do not audit attempts to send UDP traffic on the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_postfix_policyd_port" lineno="99684">
<summary>
Receive UDP traffic on the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_postfix_policyd_port" lineno="99703">
<summary>
Do not audit attempts to receive UDP traffic on the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_postfix_policyd_port" lineno="99722">
<summary>
Send and receive UDP traffic on the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_postfix_policyd_port" lineno="99739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_postfix_policyd_port" lineno="99755">
<summary>
Bind TCP sockets to the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_postfix_policyd_port" lineno="99775">
<summary>
Bind UDP sockets to the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_postfix_policyd_port" lineno="99795">
<summary>
Do not audit attempts to sbind to postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_postfix_policyd_port" lineno="99814">
<summary>
Make a TCP connection to the postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_postfix_policyd_port" lineno="99831">
<summary>
Do not audit attempts to make a TCP connection to postfix_policyd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_postfix_policyd_client_packets" lineno="99851">
<summary>
Send postfix_policyd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_postfix_policyd_client_packets" lineno="99870">
<summary>
Do not audit attempts to send postfix_policyd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_postfix_policyd_client_packets" lineno="99889">
<summary>
Receive postfix_policyd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_postfix_policyd_client_packets" lineno="99908">
<summary>
Do not audit attempts to receive postfix_policyd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_postfix_policyd_client_packets" lineno="99927">
<summary>
Send and receive postfix_policyd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_postfix_policyd_client_packets" lineno="99943">
<summary>
Do not audit attempts to send and receive postfix_policyd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_postfix_policyd_client_packets" lineno="99958">
<summary>
Relabel packets to postfix_policyd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_postfix_policyd_server_packets" lineno="99978">
<summary>
Send postfix_policyd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_postfix_policyd_server_packets" lineno="99997">
<summary>
Do not audit attempts to send postfix_policyd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_postfix_policyd_server_packets" lineno="100016">
<summary>
Receive postfix_policyd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_postfix_policyd_server_packets" lineno="100035">
<summary>
Do not audit attempts to receive postfix_policyd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_postfix_policyd_server_packets" lineno="100054">
<summary>
Send and receive postfix_policyd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_postfix_policyd_server_packets" lineno="100070">
<summary>
Do not audit attempts to send and receive postfix_policyd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_postfix_policyd_server_packets" lineno="100085">
<summary>
Relabel packets to postfix_policyd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_postgresql_port" lineno="100107">
<summary>
Send and receive TCP traffic on the postgresql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_postgresql_port" lineno="100126">
<summary>
Send UDP traffic on the postgresql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_postgresql_port" lineno="100145">
<summary>
Do not audit attempts to send UDP traffic on the postgresql port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_postgresql_port" lineno="100164">
<summary>
Receive UDP traffic on the postgresql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_postgresql_port" lineno="100183">
<summary>
Do not audit attempts to receive UDP traffic on the postgresql port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_postgresql_port" lineno="100202">
<summary>
Send and receive UDP traffic on the postgresql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_postgresql_port" lineno="100219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postgresql port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_postgresql_port" lineno="100235">
<summary>
Bind TCP sockets to the postgresql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_postgresql_port" lineno="100255">
<summary>
Bind UDP sockets to the postgresql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_postgresql_port" lineno="100275">
<summary>
Do not audit attempts to sbind to postgresql port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_postgresql_port" lineno="100294">
<summary>
Make a TCP connection to the postgresql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_postgresql_port" lineno="100311">
<summary>
Do not audit attempts to make a TCP connection to postgresql port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_postgresql_client_packets" lineno="100331">
<summary>
Send postgresql_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_postgresql_client_packets" lineno="100350">
<summary>
Do not audit attempts to send postgresql_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_postgresql_client_packets" lineno="100369">
<summary>
Receive postgresql_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_postgresql_client_packets" lineno="100388">
<summary>
Do not audit attempts to receive postgresql_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_postgresql_client_packets" lineno="100407">
<summary>
Send and receive postgresql_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_postgresql_client_packets" lineno="100423">
<summary>
Do not audit attempts to send and receive postgresql_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_postgresql_client_packets" lineno="100438">
<summary>
Relabel packets to postgresql_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_postgresql_server_packets" lineno="100458">
<summary>
Send postgresql_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_postgresql_server_packets" lineno="100477">
<summary>
Do not audit attempts to send postgresql_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_postgresql_server_packets" lineno="100496">
<summary>
Receive postgresql_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_postgresql_server_packets" lineno="100515">
<summary>
Do not audit attempts to receive postgresql_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_postgresql_server_packets" lineno="100534">
<summary>
Send and receive postgresql_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_postgresql_server_packets" lineno="100550">
<summary>
Do not audit attempts to send and receive postgresql_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_postgresql_server_packets" lineno="100565">
<summary>
Relabel packets to postgresql_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_postgrey_port" lineno="100587">
<summary>
Send and receive TCP traffic on the postgrey port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_postgrey_port" lineno="100606">
<summary>
Send UDP traffic on the postgrey port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_postgrey_port" lineno="100625">
<summary>
Do not audit attempts to send UDP traffic on the postgrey port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_postgrey_port" lineno="100644">
<summary>
Receive UDP traffic on the postgrey port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_postgrey_port" lineno="100663">
<summary>
Do not audit attempts to receive UDP traffic on the postgrey port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_postgrey_port" lineno="100682">
<summary>
Send and receive UDP traffic on the postgrey port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_postgrey_port" lineno="100699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the postgrey port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_postgrey_port" lineno="100715">
<summary>
Bind TCP sockets to the postgrey port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_postgrey_port" lineno="100735">
<summary>
Bind UDP sockets to the postgrey port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_postgrey_port" lineno="100755">
<summary>
Do not audit attempts to sbind to postgrey port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_postgrey_port" lineno="100774">
<summary>
Make a TCP connection to the postgrey port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_postgrey_port" lineno="100791">
<summary>
Do not audit attempts to make a TCP connection to postgrey port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_postgrey_client_packets" lineno="100811">
<summary>
Send postgrey_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_postgrey_client_packets" lineno="100830">
<summary>
Do not audit attempts to send postgrey_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_postgrey_client_packets" lineno="100849">
<summary>
Receive postgrey_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_postgrey_client_packets" lineno="100868">
<summary>
Do not audit attempts to receive postgrey_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_postgrey_client_packets" lineno="100887">
<summary>
Send and receive postgrey_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_postgrey_client_packets" lineno="100903">
<summary>
Do not audit attempts to send and receive postgrey_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_postgrey_client_packets" lineno="100918">
<summary>
Relabel packets to postgrey_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_postgrey_server_packets" lineno="100938">
<summary>
Send postgrey_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_postgrey_server_packets" lineno="100957">
<summary>
Do not audit attempts to send postgrey_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_postgrey_server_packets" lineno="100976">
<summary>
Receive postgrey_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_postgrey_server_packets" lineno="100995">
<summary>
Do not audit attempts to receive postgrey_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_postgrey_server_packets" lineno="101014">
<summary>
Send and receive postgrey_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_postgrey_server_packets" lineno="101030">
<summary>
Do not audit attempts to send and receive postgrey_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_postgrey_server_packets" lineno="101045">
<summary>
Relabel packets to postgrey_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pptp_port" lineno="101067">
<summary>
Send and receive TCP traffic on the pptp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pptp_port" lineno="101086">
<summary>
Send UDP traffic on the pptp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pptp_port" lineno="101105">
<summary>
Do not audit attempts to send UDP traffic on the pptp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pptp_port" lineno="101124">
<summary>
Receive UDP traffic on the pptp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pptp_port" lineno="101143">
<summary>
Do not audit attempts to receive UDP traffic on the pptp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pptp_port" lineno="101162">
<summary>
Send and receive UDP traffic on the pptp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pptp_port" lineno="101179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pptp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pptp_port" lineno="101195">
<summary>
Bind TCP sockets to the pptp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pptp_port" lineno="101215">
<summary>
Bind UDP sockets to the pptp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pptp_port" lineno="101235">
<summary>
Do not audit attempts to sbind to pptp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pptp_port" lineno="101254">
<summary>
Make a TCP connection to the pptp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pptp_port" lineno="101271">
<summary>
Do not audit attempts to make a TCP connection to pptp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pptp_client_packets" lineno="101291">
<summary>
Send pptp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pptp_client_packets" lineno="101310">
<summary>
Do not audit attempts to send pptp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pptp_client_packets" lineno="101329">
<summary>
Receive pptp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pptp_client_packets" lineno="101348">
<summary>
Do not audit attempts to receive pptp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pptp_client_packets" lineno="101367">
<summary>
Send and receive pptp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pptp_client_packets" lineno="101383">
<summary>
Do not audit attempts to send and receive pptp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pptp_client_packets" lineno="101398">
<summary>
Relabel packets to pptp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pptp_server_packets" lineno="101418">
<summary>
Send pptp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pptp_server_packets" lineno="101437">
<summary>
Do not audit attempts to send pptp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pptp_server_packets" lineno="101456">
<summary>
Receive pptp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pptp_server_packets" lineno="101475">
<summary>
Do not audit attempts to receive pptp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pptp_server_packets" lineno="101494">
<summary>
Send and receive pptp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pptp_server_packets" lineno="101510">
<summary>
Do not audit attempts to send and receive pptp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pptp_server_packets" lineno="101525">
<summary>
Relabel packets to pptp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_prelude_port" lineno="101547">
<summary>
Send and receive TCP traffic on the prelude port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_prelude_port" lineno="101566">
<summary>
Send UDP traffic on the prelude port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_prelude_port" lineno="101585">
<summary>
Do not audit attempts to send UDP traffic on the prelude port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_prelude_port" lineno="101604">
<summary>
Receive UDP traffic on the prelude port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_prelude_port" lineno="101623">
<summary>
Do not audit attempts to receive UDP traffic on the prelude port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_prelude_port" lineno="101642">
<summary>
Send and receive UDP traffic on the prelude port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_prelude_port" lineno="101659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the prelude port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_prelude_port" lineno="101675">
<summary>
Bind TCP sockets to the prelude port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_prelude_port" lineno="101695">
<summary>
Bind UDP sockets to the prelude port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_prelude_port" lineno="101715">
<summary>
Do not audit attempts to sbind to prelude port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_prelude_port" lineno="101734">
<summary>
Make a TCP connection to the prelude port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_prelude_port" lineno="101751">
<summary>
Do not audit attempts to make a TCP connection to prelude port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_prelude_client_packets" lineno="101771">
<summary>
Send prelude_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_prelude_client_packets" lineno="101790">
<summary>
Do not audit attempts to send prelude_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_prelude_client_packets" lineno="101809">
<summary>
Receive prelude_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_prelude_client_packets" lineno="101828">
<summary>
Do not audit attempts to receive prelude_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_prelude_client_packets" lineno="101847">
<summary>
Send and receive prelude_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_prelude_client_packets" lineno="101863">
<summary>
Do not audit attempts to send and receive prelude_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_prelude_client_packets" lineno="101878">
<summary>
Relabel packets to prelude_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_prelude_server_packets" lineno="101898">
<summary>
Send prelude_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_prelude_server_packets" lineno="101917">
<summary>
Do not audit attempts to send prelude_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_prelude_server_packets" lineno="101936">
<summary>
Receive prelude_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_prelude_server_packets" lineno="101955">
<summary>
Do not audit attempts to receive prelude_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_prelude_server_packets" lineno="101974">
<summary>
Send and receive prelude_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_prelude_server_packets" lineno="101990">
<summary>
Do not audit attempts to send and receive prelude_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_prelude_server_packets" lineno="102005">
<summary>
Relabel packets to prelude_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_presence_port" lineno="102027">
<summary>
Send and receive TCP traffic on the presence port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_presence_port" lineno="102046">
<summary>
Send UDP traffic on the presence port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_presence_port" lineno="102065">
<summary>
Do not audit attempts to send UDP traffic on the presence port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_presence_port" lineno="102084">
<summary>
Receive UDP traffic on the presence port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_presence_port" lineno="102103">
<summary>
Do not audit attempts to receive UDP traffic on the presence port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_presence_port" lineno="102122">
<summary>
Send and receive UDP traffic on the presence port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_presence_port" lineno="102139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the presence port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_presence_port" lineno="102155">
<summary>
Bind TCP sockets to the presence port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_presence_port" lineno="102175">
<summary>
Bind UDP sockets to the presence port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_presence_port" lineno="102195">
<summary>
Do not audit attempts to sbind to presence port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_presence_port" lineno="102214">
<summary>
Make a TCP connection to the presence port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_presence_port" lineno="102231">
<summary>
Do not audit attempts to make a TCP connection to presence port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_presence_client_packets" lineno="102251">
<summary>
Send presence_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_presence_client_packets" lineno="102270">
<summary>
Do not audit attempts to send presence_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_presence_client_packets" lineno="102289">
<summary>
Receive presence_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_presence_client_packets" lineno="102308">
<summary>
Do not audit attempts to receive presence_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_presence_client_packets" lineno="102327">
<summary>
Send and receive presence_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_presence_client_packets" lineno="102343">
<summary>
Do not audit attempts to send and receive presence_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_presence_client_packets" lineno="102358">
<summary>
Relabel packets to presence_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_presence_server_packets" lineno="102378">
<summary>
Send presence_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_presence_server_packets" lineno="102397">
<summary>
Do not audit attempts to send presence_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_presence_server_packets" lineno="102416">
<summary>
Receive presence_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_presence_server_packets" lineno="102435">
<summary>
Do not audit attempts to receive presence_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_presence_server_packets" lineno="102454">
<summary>
Send and receive presence_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_presence_server_packets" lineno="102470">
<summary>
Do not audit attempts to send and receive presence_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_presence_server_packets" lineno="102485">
<summary>
Relabel packets to presence_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_preupgrade_port" lineno="102507">
<summary>
Send and receive TCP traffic on the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_preupgrade_port" lineno="102526">
<summary>
Send UDP traffic on the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_preupgrade_port" lineno="102545">
<summary>
Do not audit attempts to send UDP traffic on the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_preupgrade_port" lineno="102564">
<summary>
Receive UDP traffic on the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_preupgrade_port" lineno="102583">
<summary>
Do not audit attempts to receive UDP traffic on the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_preupgrade_port" lineno="102602">
<summary>
Send and receive UDP traffic on the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_preupgrade_port" lineno="102619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_preupgrade_port" lineno="102635">
<summary>
Bind TCP sockets to the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_preupgrade_port" lineno="102655">
<summary>
Bind UDP sockets to the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_preupgrade_port" lineno="102675">
<summary>
Do not audit attempts to sbind to preupgrade port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_preupgrade_port" lineno="102694">
<summary>
Make a TCP connection to the preupgrade port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_preupgrade_port" lineno="102711">
<summary>
Do not audit attempts to make a TCP connection to preupgrade port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_preupgrade_client_packets" lineno="102731">
<summary>
Send preupgrade_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_preupgrade_client_packets" lineno="102750">
<summary>
Do not audit attempts to send preupgrade_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_preupgrade_client_packets" lineno="102769">
<summary>
Receive preupgrade_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_preupgrade_client_packets" lineno="102788">
<summary>
Do not audit attempts to receive preupgrade_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_preupgrade_client_packets" lineno="102807">
<summary>
Send and receive preupgrade_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_preupgrade_client_packets" lineno="102823">
<summary>
Do not audit attempts to send and receive preupgrade_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_preupgrade_client_packets" lineno="102838">
<summary>
Relabel packets to preupgrade_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_preupgrade_server_packets" lineno="102858">
<summary>
Send preupgrade_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_preupgrade_server_packets" lineno="102877">
<summary>
Do not audit attempts to send preupgrade_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_preupgrade_server_packets" lineno="102896">
<summary>
Receive preupgrade_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_preupgrade_server_packets" lineno="102915">
<summary>
Do not audit attempts to receive preupgrade_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_preupgrade_server_packets" lineno="102934">
<summary>
Send and receive preupgrade_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_preupgrade_server_packets" lineno="102950">
<summary>
Do not audit attempts to send and receive preupgrade_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_preupgrade_server_packets" lineno="102965">
<summary>
Relabel packets to preupgrade_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_printer_port" lineno="102987">
<summary>
Send and receive TCP traffic on the printer port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_printer_port" lineno="103006">
<summary>
Send UDP traffic on the printer port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_printer_port" lineno="103025">
<summary>
Do not audit attempts to send UDP traffic on the printer port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_printer_port" lineno="103044">
<summary>
Receive UDP traffic on the printer port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_printer_port" lineno="103063">
<summary>
Do not audit attempts to receive UDP traffic on the printer port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_printer_port" lineno="103082">
<summary>
Send and receive UDP traffic on the printer port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_printer_port" lineno="103099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the printer port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_printer_port" lineno="103115">
<summary>
Bind TCP sockets to the printer port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_printer_port" lineno="103135">
<summary>
Bind UDP sockets to the printer port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_printer_port" lineno="103155">
<summary>
Do not audit attempts to sbind to printer port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_printer_port" lineno="103174">
<summary>
Make a TCP connection to the printer port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_printer_port" lineno="103191">
<summary>
Do not audit attempts to make a TCP connection to printer port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_printer_client_packets" lineno="103211">
<summary>
Send printer_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_printer_client_packets" lineno="103230">
<summary>
Do not audit attempts to send printer_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_printer_client_packets" lineno="103249">
<summary>
Receive printer_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_printer_client_packets" lineno="103268">
<summary>
Do not audit attempts to receive printer_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_printer_client_packets" lineno="103287">
<summary>
Send and receive printer_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_printer_client_packets" lineno="103303">
<summary>
Do not audit attempts to send and receive printer_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_printer_client_packets" lineno="103318">
<summary>
Relabel packets to printer_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_printer_server_packets" lineno="103338">
<summary>
Send printer_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_printer_server_packets" lineno="103357">
<summary>
Do not audit attempts to send printer_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_printer_server_packets" lineno="103376">
<summary>
Receive printer_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_printer_server_packets" lineno="103395">
<summary>
Do not audit attempts to receive printer_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_printer_server_packets" lineno="103414">
<summary>
Send and receive printer_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_printer_server_packets" lineno="103430">
<summary>
Do not audit attempts to send and receive printer_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_printer_server_packets" lineno="103445">
<summary>
Relabel packets to printer_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_priority_e_com_port" lineno="103467">
<summary>
Send and receive TCP traffic on the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_priority_e_com_port" lineno="103486">
<summary>
Send UDP traffic on the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_priority_e_com_port" lineno="103505">
<summary>
Do not audit attempts to send UDP traffic on the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_priority_e_com_port" lineno="103524">
<summary>
Receive UDP traffic on the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_priority_e_com_port" lineno="103543">
<summary>
Do not audit attempts to receive UDP traffic on the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_priority_e_com_port" lineno="103562">
<summary>
Send and receive UDP traffic on the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_priority_e_com_port" lineno="103579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_priority_e_com_port" lineno="103595">
<summary>
Bind TCP sockets to the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_priority_e_com_port" lineno="103615">
<summary>
Bind UDP sockets to the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_priority_e_com_port" lineno="103635">
<summary>
Do not audit attempts to sbind to priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_priority_e_com_port" lineno="103654">
<summary>
Make a TCP connection to the priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_priority_e_com_port" lineno="103671">
<summary>
Do not audit attempts to make a TCP connection to priority_e_com port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_priority_e_com_client_packets" lineno="103691">
<summary>
Send priority_e_com_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_priority_e_com_client_packets" lineno="103710">
<summary>
Do not audit attempts to send priority_e_com_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_priority_e_com_client_packets" lineno="103729">
<summary>
Receive priority_e_com_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_priority_e_com_client_packets" lineno="103748">
<summary>
Do not audit attempts to receive priority_e_com_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_priority_e_com_client_packets" lineno="103767">
<summary>
Send and receive priority_e_com_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_priority_e_com_client_packets" lineno="103783">
<summary>
Do not audit attempts to send and receive priority_e_com_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_priority_e_com_client_packets" lineno="103798">
<summary>
Relabel packets to priority_e_com_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_priority_e_com_server_packets" lineno="103818">
<summary>
Send priority_e_com_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_priority_e_com_server_packets" lineno="103837">
<summary>
Do not audit attempts to send priority_e_com_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_priority_e_com_server_packets" lineno="103856">
<summary>
Receive priority_e_com_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_priority_e_com_server_packets" lineno="103875">
<summary>
Do not audit attempts to receive priority_e_com_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_priority_e_com_server_packets" lineno="103894">
<summary>
Send and receive priority_e_com_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_priority_e_com_server_packets" lineno="103910">
<summary>
Do not audit attempts to send and receive priority_e_com_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_priority_e_com_server_packets" lineno="103925">
<summary>
Relabel packets to priority_e_com_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_prosody_port" lineno="103947">
<summary>
Send and receive TCP traffic on the prosody port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_prosody_port" lineno="103966">
<summary>
Send UDP traffic on the prosody port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_prosody_port" lineno="103985">
<summary>
Do not audit attempts to send UDP traffic on the prosody port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_prosody_port" lineno="104004">
<summary>
Receive UDP traffic on the prosody port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_prosody_port" lineno="104023">
<summary>
Do not audit attempts to receive UDP traffic on the prosody port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_prosody_port" lineno="104042">
<summary>
Send and receive UDP traffic on the prosody port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_prosody_port" lineno="104059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the prosody port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_prosody_port" lineno="104075">
<summary>
Bind TCP sockets to the prosody port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_prosody_port" lineno="104095">
<summary>
Bind UDP sockets to the prosody port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_prosody_port" lineno="104115">
<summary>
Do not audit attempts to sbind to prosody port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_prosody_port" lineno="104134">
<summary>
Make a TCP connection to the prosody port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_prosody_port" lineno="104151">
<summary>
Do not audit attempts to make a TCP connection to prosody port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_prosody_client_packets" lineno="104171">
<summary>
Send prosody_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_prosody_client_packets" lineno="104190">
<summary>
Do not audit attempts to send prosody_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_prosody_client_packets" lineno="104209">
<summary>
Receive prosody_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_prosody_client_packets" lineno="104228">
<summary>
Do not audit attempts to receive prosody_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_prosody_client_packets" lineno="104247">
<summary>
Send and receive prosody_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_prosody_client_packets" lineno="104263">
<summary>
Do not audit attempts to send and receive prosody_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_prosody_client_packets" lineno="104278">
<summary>
Relabel packets to prosody_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_prosody_server_packets" lineno="104298">
<summary>
Send prosody_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_prosody_server_packets" lineno="104317">
<summary>
Do not audit attempts to send prosody_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_prosody_server_packets" lineno="104336">
<summary>
Receive prosody_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_prosody_server_packets" lineno="104355">
<summary>
Do not audit attempts to receive prosody_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_prosody_server_packets" lineno="104374">
<summary>
Send and receive prosody_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_prosody_server_packets" lineno="104390">
<summary>
Do not audit attempts to send and receive prosody_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_prosody_server_packets" lineno="104405">
<summary>
Relabel packets to prosody_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ptal_port" lineno="104427">
<summary>
Send and receive TCP traffic on the ptal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ptal_port" lineno="104446">
<summary>
Send UDP traffic on the ptal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ptal_port" lineno="104465">
<summary>
Do not audit attempts to send UDP traffic on the ptal port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ptal_port" lineno="104484">
<summary>
Receive UDP traffic on the ptal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ptal_port" lineno="104503">
<summary>
Do not audit attempts to receive UDP traffic on the ptal port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ptal_port" lineno="104522">
<summary>
Send and receive UDP traffic on the ptal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ptal_port" lineno="104539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ptal port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ptal_port" lineno="104555">
<summary>
Bind TCP sockets to the ptal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ptal_port" lineno="104575">
<summary>
Bind UDP sockets to the ptal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ptal_port" lineno="104595">
<summary>
Do not audit attempts to sbind to ptal port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ptal_port" lineno="104614">
<summary>
Make a TCP connection to the ptal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ptal_port" lineno="104631">
<summary>
Do not audit attempts to make a TCP connection to ptal port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ptal_client_packets" lineno="104651">
<summary>
Send ptal_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ptal_client_packets" lineno="104670">
<summary>
Do not audit attempts to send ptal_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ptal_client_packets" lineno="104689">
<summary>
Receive ptal_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ptal_client_packets" lineno="104708">
<summary>
Do not audit attempts to receive ptal_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ptal_client_packets" lineno="104727">
<summary>
Send and receive ptal_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ptal_client_packets" lineno="104743">
<summary>
Do not audit attempts to send and receive ptal_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ptal_client_packets" lineno="104758">
<summary>
Relabel packets to ptal_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ptal_server_packets" lineno="104778">
<summary>
Send ptal_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ptal_server_packets" lineno="104797">
<summary>
Do not audit attempts to send ptal_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ptal_server_packets" lineno="104816">
<summary>
Receive ptal_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ptal_server_packets" lineno="104835">
<summary>
Do not audit attempts to receive ptal_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ptal_server_packets" lineno="104854">
<summary>
Send and receive ptal_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ptal_server_packets" lineno="104870">
<summary>
Do not audit attempts to send and receive ptal_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ptal_server_packets" lineno="104885">
<summary>
Relabel packets to ptal_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ptp_event_port" lineno="104907">
<summary>
Send and receive TCP traffic on the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ptp_event_port" lineno="104926">
<summary>
Send UDP traffic on the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ptp_event_port" lineno="104945">
<summary>
Do not audit attempts to send UDP traffic on the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ptp_event_port" lineno="104964">
<summary>
Receive UDP traffic on the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ptp_event_port" lineno="104983">
<summary>
Do not audit attempts to receive UDP traffic on the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ptp_event_port" lineno="105002">
<summary>
Send and receive UDP traffic on the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ptp_event_port" lineno="105019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ptp_event_port" lineno="105035">
<summary>
Bind TCP sockets to the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ptp_event_port" lineno="105055">
<summary>
Bind UDP sockets to the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ptp_event_port" lineno="105075">
<summary>
Do not audit attempts to sbind to ptp_event port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ptp_event_port" lineno="105094">
<summary>
Make a TCP connection to the ptp_event port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ptp_event_port" lineno="105111">
<summary>
Do not audit attempts to make a TCP connection to ptp_event port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ptp_event_client_packets" lineno="105131">
<summary>
Send ptp_event_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ptp_event_client_packets" lineno="105150">
<summary>
Do not audit attempts to send ptp_event_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ptp_event_client_packets" lineno="105169">
<summary>
Receive ptp_event_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ptp_event_client_packets" lineno="105188">
<summary>
Do not audit attempts to receive ptp_event_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ptp_event_client_packets" lineno="105207">
<summary>
Send and receive ptp_event_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ptp_event_client_packets" lineno="105223">
<summary>
Do not audit attempts to send and receive ptp_event_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ptp_event_client_packets" lineno="105238">
<summary>
Relabel packets to ptp_event_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ptp_event_server_packets" lineno="105258">
<summary>
Send ptp_event_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ptp_event_server_packets" lineno="105277">
<summary>
Do not audit attempts to send ptp_event_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ptp_event_server_packets" lineno="105296">
<summary>
Receive ptp_event_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ptp_event_server_packets" lineno="105315">
<summary>
Do not audit attempts to receive ptp_event_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ptp_event_server_packets" lineno="105334">
<summary>
Send and receive ptp_event_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ptp_event_server_packets" lineno="105350">
<summary>
Do not audit attempts to send and receive ptp_event_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ptp_event_server_packets" lineno="105365">
<summary>
Relabel packets to ptp_event_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pulseaudio_port" lineno="105387">
<summary>
Send and receive TCP traffic on the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pulseaudio_port" lineno="105406">
<summary>
Send UDP traffic on the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pulseaudio_port" lineno="105425">
<summary>
Do not audit attempts to send UDP traffic on the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pulseaudio_port" lineno="105444">
<summary>
Receive UDP traffic on the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pulseaudio_port" lineno="105463">
<summary>
Do not audit attempts to receive UDP traffic on the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pulseaudio_port" lineno="105482">
<summary>
Send and receive UDP traffic on the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pulseaudio_port" lineno="105499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pulseaudio_port" lineno="105515">
<summary>
Bind TCP sockets to the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pulseaudio_port" lineno="105535">
<summary>
Bind UDP sockets to the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pulseaudio_port" lineno="105555">
<summary>
Do not audit attempts to sbind to pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pulseaudio_port" lineno="105574">
<summary>
Make a TCP connection to the pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pulseaudio_port" lineno="105591">
<summary>
Do not audit attempts to make a TCP connection to pulseaudio port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pulseaudio_client_packets" lineno="105611">
<summary>
Send pulseaudio_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pulseaudio_client_packets" lineno="105630">
<summary>
Do not audit attempts to send pulseaudio_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pulseaudio_client_packets" lineno="105649">
<summary>
Receive pulseaudio_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pulseaudio_client_packets" lineno="105668">
<summary>
Do not audit attempts to receive pulseaudio_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pulseaudio_client_packets" lineno="105687">
<summary>
Send and receive pulseaudio_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pulseaudio_client_packets" lineno="105703">
<summary>
Do not audit attempts to send and receive pulseaudio_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pulseaudio_client_packets" lineno="105718">
<summary>
Relabel packets to pulseaudio_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pulseaudio_server_packets" lineno="105738">
<summary>
Send pulseaudio_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pulseaudio_server_packets" lineno="105757">
<summary>
Do not audit attempts to send pulseaudio_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pulseaudio_server_packets" lineno="105776">
<summary>
Receive pulseaudio_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pulseaudio_server_packets" lineno="105795">
<summary>
Do not audit attempts to receive pulseaudio_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pulseaudio_server_packets" lineno="105814">
<summary>
Send and receive pulseaudio_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pulseaudio_server_packets" lineno="105830">
<summary>
Do not audit attempts to send and receive pulseaudio_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pulseaudio_server_packets" lineno="105845">
<summary>
Relabel packets to pulseaudio_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pulp_port" lineno="105867">
<summary>
Send and receive TCP traffic on the pulp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pulp_port" lineno="105886">
<summary>
Send UDP traffic on the pulp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pulp_port" lineno="105905">
<summary>
Do not audit attempts to send UDP traffic on the pulp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pulp_port" lineno="105924">
<summary>
Receive UDP traffic on the pulp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pulp_port" lineno="105943">
<summary>
Do not audit attempts to receive UDP traffic on the pulp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pulp_port" lineno="105962">
<summary>
Send and receive UDP traffic on the pulp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pulp_port" lineno="105979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pulp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pulp_port" lineno="105995">
<summary>
Bind TCP sockets to the pulp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pulp_port" lineno="106015">
<summary>
Bind UDP sockets to the pulp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pulp_port" lineno="106035">
<summary>
Do not audit attempts to sbind to pulp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pulp_port" lineno="106054">
<summary>
Make a TCP connection to the pulp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pulp_port" lineno="106071">
<summary>
Do not audit attempts to make a TCP connection to pulp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pulp_client_packets" lineno="106091">
<summary>
Send pulp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pulp_client_packets" lineno="106110">
<summary>
Do not audit attempts to send pulp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pulp_client_packets" lineno="106129">
<summary>
Receive pulp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pulp_client_packets" lineno="106148">
<summary>
Do not audit attempts to receive pulp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pulp_client_packets" lineno="106167">
<summary>
Send and receive pulp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pulp_client_packets" lineno="106183">
<summary>
Do not audit attempts to send and receive pulp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pulp_client_packets" lineno="106198">
<summary>
Relabel packets to pulp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pulp_server_packets" lineno="106218">
<summary>
Send pulp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pulp_server_packets" lineno="106237">
<summary>
Do not audit attempts to send pulp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pulp_server_packets" lineno="106256">
<summary>
Receive pulp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pulp_server_packets" lineno="106275">
<summary>
Do not audit attempts to receive pulp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pulp_server_packets" lineno="106294">
<summary>
Send and receive pulp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pulp_server_packets" lineno="106310">
<summary>
Do not audit attempts to send and receive pulp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pulp_server_packets" lineno="106325">
<summary>
Relabel packets to pulp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_puppet_port" lineno="106347">
<summary>
Send and receive TCP traffic on the puppet port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_puppet_port" lineno="106366">
<summary>
Send UDP traffic on the puppet port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_puppet_port" lineno="106385">
<summary>
Do not audit attempts to send UDP traffic on the puppet port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_puppet_port" lineno="106404">
<summary>
Receive UDP traffic on the puppet port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_puppet_port" lineno="106423">
<summary>
Do not audit attempts to receive UDP traffic on the puppet port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_puppet_port" lineno="106442">
<summary>
Send and receive UDP traffic on the puppet port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_puppet_port" lineno="106459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the puppet port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_puppet_port" lineno="106475">
<summary>
Bind TCP sockets to the puppet port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_puppet_port" lineno="106495">
<summary>
Bind UDP sockets to the puppet port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_puppet_port" lineno="106515">
<summary>
Do not audit attempts to sbind to puppet port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_puppet_port" lineno="106534">
<summary>
Make a TCP connection to the puppet port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_puppet_port" lineno="106551">
<summary>
Do not audit attempts to make a TCP connection to puppet port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_puppet_client_packets" lineno="106571">
<summary>
Send puppet_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_puppet_client_packets" lineno="106590">
<summary>
Do not audit attempts to send puppet_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_puppet_client_packets" lineno="106609">
<summary>
Receive puppet_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_puppet_client_packets" lineno="106628">
<summary>
Do not audit attempts to receive puppet_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_puppet_client_packets" lineno="106647">
<summary>
Send and receive puppet_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_puppet_client_packets" lineno="106663">
<summary>
Do not audit attempts to send and receive puppet_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_puppet_client_packets" lineno="106678">
<summary>
Relabel packets to puppet_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_puppet_server_packets" lineno="106698">
<summary>
Send puppet_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_puppet_server_packets" lineno="106717">
<summary>
Do not audit attempts to send puppet_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_puppet_server_packets" lineno="106736">
<summary>
Receive puppet_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_puppet_server_packets" lineno="106755">
<summary>
Do not audit attempts to receive puppet_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_puppet_server_packets" lineno="106774">
<summary>
Send and receive puppet_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_puppet_server_packets" lineno="106790">
<summary>
Do not audit attempts to send and receive puppet_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_puppet_server_packets" lineno="106805">
<summary>
Relabel packets to puppet_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pxe_port" lineno="106827">
<summary>
Send and receive TCP traffic on the pxe port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pxe_port" lineno="106846">
<summary>
Send UDP traffic on the pxe port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pxe_port" lineno="106865">
<summary>
Do not audit attempts to send UDP traffic on the pxe port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pxe_port" lineno="106884">
<summary>
Receive UDP traffic on the pxe port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pxe_port" lineno="106903">
<summary>
Do not audit attempts to receive UDP traffic on the pxe port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pxe_port" lineno="106922">
<summary>
Send and receive UDP traffic on the pxe port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pxe_port" lineno="106939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pxe port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pxe_port" lineno="106955">
<summary>
Bind TCP sockets to the pxe port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pxe_port" lineno="106975">
<summary>
Bind UDP sockets to the pxe port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pxe_port" lineno="106995">
<summary>
Do not audit attempts to sbind to pxe port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pxe_port" lineno="107014">
<summary>
Make a TCP connection to the pxe port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pxe_port" lineno="107031">
<summary>
Do not audit attempts to make a TCP connection to pxe port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pxe_client_packets" lineno="107051">
<summary>
Send pxe_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pxe_client_packets" lineno="107070">
<summary>
Do not audit attempts to send pxe_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pxe_client_packets" lineno="107089">
<summary>
Receive pxe_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pxe_client_packets" lineno="107108">
<summary>
Do not audit attempts to receive pxe_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pxe_client_packets" lineno="107127">
<summary>
Send and receive pxe_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pxe_client_packets" lineno="107143">
<summary>
Do not audit attempts to send and receive pxe_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pxe_client_packets" lineno="107158">
<summary>
Relabel packets to pxe_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pxe_server_packets" lineno="107178">
<summary>
Send pxe_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pxe_server_packets" lineno="107197">
<summary>
Do not audit attempts to send pxe_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pxe_server_packets" lineno="107216">
<summary>
Receive pxe_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pxe_server_packets" lineno="107235">
<summary>
Do not audit attempts to receive pxe_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pxe_server_packets" lineno="107254">
<summary>
Send and receive pxe_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pxe_server_packets" lineno="107270">
<summary>
Do not audit attempts to send and receive pxe_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pxe_server_packets" lineno="107285">
<summary>
Relabel packets to pxe_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_pyzor_port" lineno="107307">
<summary>
Send and receive TCP traffic on the pyzor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_pyzor_port" lineno="107326">
<summary>
Send UDP traffic on the pyzor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_pyzor_port" lineno="107345">
<summary>
Do not audit attempts to send UDP traffic on the pyzor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_pyzor_port" lineno="107364">
<summary>
Receive UDP traffic on the pyzor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_pyzor_port" lineno="107383">
<summary>
Do not audit attempts to receive UDP traffic on the pyzor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_pyzor_port" lineno="107402">
<summary>
Send and receive UDP traffic on the pyzor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_pyzor_port" lineno="107419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the pyzor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_pyzor_port" lineno="107435">
<summary>
Bind TCP sockets to the pyzor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_pyzor_port" lineno="107455">
<summary>
Bind UDP sockets to the pyzor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_pyzor_port" lineno="107475">
<summary>
Do not audit attempts to sbind to pyzor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_pyzor_port" lineno="107494">
<summary>
Make a TCP connection to the pyzor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_pyzor_port" lineno="107511">
<summary>
Do not audit attempts to make a TCP connection to pyzor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pyzor_client_packets" lineno="107531">
<summary>
Send pyzor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pyzor_client_packets" lineno="107550">
<summary>
Do not audit attempts to send pyzor_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pyzor_client_packets" lineno="107569">
<summary>
Receive pyzor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pyzor_client_packets" lineno="107588">
<summary>
Do not audit attempts to receive pyzor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pyzor_client_packets" lineno="107607">
<summary>
Send and receive pyzor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pyzor_client_packets" lineno="107623">
<summary>
Do not audit attempts to send and receive pyzor_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pyzor_client_packets" lineno="107638">
<summary>
Relabel packets to pyzor_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_pyzor_server_packets" lineno="107658">
<summary>
Send pyzor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_pyzor_server_packets" lineno="107677">
<summary>
Do not audit attempts to send pyzor_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_pyzor_server_packets" lineno="107696">
<summary>
Receive pyzor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_pyzor_server_packets" lineno="107715">
<summary>
Do not audit attempts to receive pyzor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_pyzor_server_packets" lineno="107734">
<summary>
Send and receive pyzor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_pyzor_server_packets" lineno="107750">
<summary>
Do not audit attempts to send and receive pyzor_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_pyzor_server_packets" lineno="107765">
<summary>
Relabel packets to pyzor_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_neutron_port" lineno="107787">
<summary>
Send and receive TCP traffic on the neutron port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_neutron_port" lineno="107806">
<summary>
Send UDP traffic on the neutron port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_neutron_port" lineno="107825">
<summary>
Do not audit attempts to send UDP traffic on the neutron port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_neutron_port" lineno="107844">
<summary>
Receive UDP traffic on the neutron port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_neutron_port" lineno="107863">
<summary>
Do not audit attempts to receive UDP traffic on the neutron port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_neutron_port" lineno="107882">
<summary>
Send and receive UDP traffic on the neutron port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_neutron_port" lineno="107899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the neutron port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_neutron_port" lineno="107915">
<summary>
Bind TCP sockets to the neutron port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_neutron_port" lineno="107935">
<summary>
Bind UDP sockets to the neutron port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_neutron_port" lineno="107955">
<summary>
Do not audit attempts to sbind to neutron port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_neutron_port" lineno="107974">
<summary>
Make a TCP connection to the neutron port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_neutron_port" lineno="107991">
<summary>
Do not audit attempts to make a TCP connection to neutron port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_neutron_client_packets" lineno="108011">
<summary>
Send neutron_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_neutron_client_packets" lineno="108030">
<summary>
Do not audit attempts to send neutron_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_neutron_client_packets" lineno="108049">
<summary>
Receive neutron_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_neutron_client_packets" lineno="108068">
<summary>
Do not audit attempts to receive neutron_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_neutron_client_packets" lineno="108087">
<summary>
Send and receive neutron_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_neutron_client_packets" lineno="108103">
<summary>
Do not audit attempts to send and receive neutron_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_neutron_client_packets" lineno="108118">
<summary>
Relabel packets to neutron_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_neutron_server_packets" lineno="108138">
<summary>
Send neutron_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_neutron_server_packets" lineno="108157">
<summary>
Do not audit attempts to send neutron_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_neutron_server_packets" lineno="108176">
<summary>
Receive neutron_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_neutron_server_packets" lineno="108195">
<summary>
Do not audit attempts to receive neutron_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_neutron_server_packets" lineno="108214">
<summary>
Send and receive neutron_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_neutron_server_packets" lineno="108230">
<summary>
Do not audit attempts to send and receive neutron_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_neutron_server_packets" lineno="108245">
<summary>
Relabel packets to neutron_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_nsd_control_port" lineno="108267">
<summary>
Send and receive TCP traffic on the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_nsd_control_port" lineno="108286">
<summary>
Send UDP traffic on the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_nsd_control_port" lineno="108305">
<summary>
Do not audit attempts to send UDP traffic on the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_nsd_control_port" lineno="108324">
<summary>
Receive UDP traffic on the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_nsd_control_port" lineno="108343">
<summary>
Do not audit attempts to receive UDP traffic on the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_nsd_control_port" lineno="108362">
<summary>
Send and receive UDP traffic on the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_nsd_control_port" lineno="108379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_nsd_control_port" lineno="108395">
<summary>
Bind TCP sockets to the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_nsd_control_port" lineno="108415">
<summary>
Bind UDP sockets to the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_nsd_control_port" lineno="108435">
<summary>
Do not audit attempts to sbind to nsd_control port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_nsd_control_port" lineno="108454">
<summary>
Make a TCP connection to the nsd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_nsd_control_port" lineno="108471">
<summary>
Do not audit attempts to make a TCP connection to nsd_control port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nsd_control_client_packets" lineno="108491">
<summary>
Send nsd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nsd_control_client_packets" lineno="108510">
<summary>
Do not audit attempts to send nsd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nsd_control_client_packets" lineno="108529">
<summary>
Receive nsd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nsd_control_client_packets" lineno="108548">
<summary>
Do not audit attempts to receive nsd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nsd_control_client_packets" lineno="108567">
<summary>
Send and receive nsd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nsd_control_client_packets" lineno="108583">
<summary>
Do not audit attempts to send and receive nsd_control_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nsd_control_client_packets" lineno="108598">
<summary>
Relabel packets to nsd_control_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_nsd_control_server_packets" lineno="108618">
<summary>
Send nsd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_nsd_control_server_packets" lineno="108637">
<summary>
Do not audit attempts to send nsd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_nsd_control_server_packets" lineno="108656">
<summary>
Receive nsd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_nsd_control_server_packets" lineno="108675">
<summary>
Do not audit attempts to receive nsd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_nsd_control_server_packets" lineno="108694">
<summary>
Send and receive nsd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_nsd_control_server_packets" lineno="108710">
<summary>
Do not audit attempts to send and receive nsd_control_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_nsd_control_server_packets" lineno="108725">
<summary>
Relabel packets to nsd_control_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_radacct_port" lineno="108747">
<summary>
Send and receive TCP traffic on the radacct port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_radacct_port" lineno="108766">
<summary>
Send UDP traffic on the radacct port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_radacct_port" lineno="108785">
<summary>
Do not audit attempts to send UDP traffic on the radacct port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_radacct_port" lineno="108804">
<summary>
Receive UDP traffic on the radacct port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_radacct_port" lineno="108823">
<summary>
Do not audit attempts to receive UDP traffic on the radacct port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_radacct_port" lineno="108842">
<summary>
Send and receive UDP traffic on the radacct port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_radacct_port" lineno="108859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radacct port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_radacct_port" lineno="108875">
<summary>
Bind TCP sockets to the radacct port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_radacct_port" lineno="108895">
<summary>
Bind UDP sockets to the radacct port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_radacct_port" lineno="108915">
<summary>
Do not audit attempts to sbind to radacct port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_radacct_port" lineno="108934">
<summary>
Make a TCP connection to the radacct port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_radacct_port" lineno="108951">
<summary>
Do not audit attempts to make a TCP connection to radacct port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_radacct_client_packets" lineno="108971">
<summary>
Send radacct_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_radacct_client_packets" lineno="108990">
<summary>
Do not audit attempts to send radacct_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_radacct_client_packets" lineno="109009">
<summary>
Receive radacct_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_radacct_client_packets" lineno="109028">
<summary>
Do not audit attempts to receive radacct_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_radacct_client_packets" lineno="109047">
<summary>
Send and receive radacct_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_radacct_client_packets" lineno="109063">
<summary>
Do not audit attempts to send and receive radacct_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_radacct_client_packets" lineno="109078">
<summary>
Relabel packets to radacct_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_radacct_server_packets" lineno="109098">
<summary>
Send radacct_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_radacct_server_packets" lineno="109117">
<summary>
Do not audit attempts to send radacct_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_radacct_server_packets" lineno="109136">
<summary>
Receive radacct_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_radacct_server_packets" lineno="109155">
<summary>
Do not audit attempts to receive radacct_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_radacct_server_packets" lineno="109174">
<summary>
Send and receive radacct_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_radacct_server_packets" lineno="109190">
<summary>
Do not audit attempts to send and receive radacct_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_radacct_server_packets" lineno="109205">
<summary>
Relabel packets to radacct_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_radius_port" lineno="109227">
<summary>
Send and receive TCP traffic on the radius port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_radius_port" lineno="109246">
<summary>
Send UDP traffic on the radius port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_radius_port" lineno="109265">
<summary>
Do not audit attempts to send UDP traffic on the radius port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_radius_port" lineno="109284">
<summary>
Receive UDP traffic on the radius port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_radius_port" lineno="109303">
<summary>
Do not audit attempts to receive UDP traffic on the radius port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_radius_port" lineno="109322">
<summary>
Send and receive UDP traffic on the radius port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_radius_port" lineno="109339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radius port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_radius_port" lineno="109355">
<summary>
Bind TCP sockets to the radius port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_radius_port" lineno="109375">
<summary>
Bind UDP sockets to the radius port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_radius_port" lineno="109395">
<summary>
Do not audit attempts to sbind to radius port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_radius_port" lineno="109414">
<summary>
Make a TCP connection to the radius port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_radius_port" lineno="109431">
<summary>
Do not audit attempts to make a TCP connection to radius port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_radius_client_packets" lineno="109451">
<summary>
Send radius_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_radius_client_packets" lineno="109470">
<summary>
Do not audit attempts to send radius_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_radius_client_packets" lineno="109489">
<summary>
Receive radius_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_radius_client_packets" lineno="109508">
<summary>
Do not audit attempts to receive radius_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_radius_client_packets" lineno="109527">
<summary>
Send and receive radius_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_radius_client_packets" lineno="109543">
<summary>
Do not audit attempts to send and receive radius_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_radius_client_packets" lineno="109558">
<summary>
Relabel packets to radius_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_radius_server_packets" lineno="109578">
<summary>
Send radius_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_radius_server_packets" lineno="109597">
<summary>
Do not audit attempts to send radius_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_radius_server_packets" lineno="109616">
<summary>
Receive radius_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_radius_server_packets" lineno="109635">
<summary>
Do not audit attempts to receive radius_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_radius_server_packets" lineno="109654">
<summary>
Send and receive radius_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_radius_server_packets" lineno="109670">
<summary>
Do not audit attempts to send and receive radius_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_radius_server_packets" lineno="109685">
<summary>
Relabel packets to radius_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_radsec_port" lineno="109707">
<summary>
Send and receive TCP traffic on the radsec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_radsec_port" lineno="109726">
<summary>
Send UDP traffic on the radsec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_radsec_port" lineno="109745">
<summary>
Do not audit attempts to send UDP traffic on the radsec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_radsec_port" lineno="109764">
<summary>
Receive UDP traffic on the radsec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_radsec_port" lineno="109783">
<summary>
Do not audit attempts to receive UDP traffic on the radsec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_radsec_port" lineno="109802">
<summary>
Send and receive UDP traffic on the radsec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_radsec_port" lineno="109819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the radsec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_radsec_port" lineno="109835">
<summary>
Bind TCP sockets to the radsec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_radsec_port" lineno="109855">
<summary>
Bind UDP sockets to the radsec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_radsec_port" lineno="109875">
<summary>
Do not audit attempts to sbind to radsec port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_radsec_port" lineno="109894">
<summary>
Make a TCP connection to the radsec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_radsec_port" lineno="109911">
<summary>
Do not audit attempts to make a TCP connection to radsec port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_radsec_client_packets" lineno="109931">
<summary>
Send radsec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_radsec_client_packets" lineno="109950">
<summary>
Do not audit attempts to send radsec_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_radsec_client_packets" lineno="109969">
<summary>
Receive radsec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_radsec_client_packets" lineno="109988">
<summary>
Do not audit attempts to receive radsec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_radsec_client_packets" lineno="110007">
<summary>
Send and receive radsec_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_radsec_client_packets" lineno="110023">
<summary>
Do not audit attempts to send and receive radsec_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_radsec_client_packets" lineno="110038">
<summary>
Relabel packets to radsec_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_radsec_server_packets" lineno="110058">
<summary>
Send radsec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_radsec_server_packets" lineno="110077">
<summary>
Do not audit attempts to send radsec_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_radsec_server_packets" lineno="110096">
<summary>
Receive radsec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_radsec_server_packets" lineno="110115">
<summary>
Do not audit attempts to receive radsec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_radsec_server_packets" lineno="110134">
<summary>
Send and receive radsec_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_radsec_server_packets" lineno="110150">
<summary>
Do not audit attempts to send and receive radsec_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_radsec_server_packets" lineno="110165">
<summary>
Relabel packets to radsec_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_razor_port" lineno="110187">
<summary>
Send and receive TCP traffic on the razor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_razor_port" lineno="110206">
<summary>
Send UDP traffic on the razor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_razor_port" lineno="110225">
<summary>
Do not audit attempts to send UDP traffic on the razor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_razor_port" lineno="110244">
<summary>
Receive UDP traffic on the razor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_razor_port" lineno="110263">
<summary>
Do not audit attempts to receive UDP traffic on the razor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_razor_port" lineno="110282">
<summary>
Send and receive UDP traffic on the razor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_razor_port" lineno="110299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the razor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_razor_port" lineno="110315">
<summary>
Bind TCP sockets to the razor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_razor_port" lineno="110335">
<summary>
Bind UDP sockets to the razor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_razor_port" lineno="110355">
<summary>
Do not audit attempts to sbind to razor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_razor_port" lineno="110374">
<summary>
Make a TCP connection to the razor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_razor_port" lineno="110391">
<summary>
Do not audit attempts to make a TCP connection to razor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_razor_client_packets" lineno="110411">
<summary>
Send razor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_razor_client_packets" lineno="110430">
<summary>
Do not audit attempts to send razor_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_razor_client_packets" lineno="110449">
<summary>
Receive razor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_razor_client_packets" lineno="110468">
<summary>
Do not audit attempts to receive razor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_razor_client_packets" lineno="110487">
<summary>
Send and receive razor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_razor_client_packets" lineno="110503">
<summary>
Do not audit attempts to send and receive razor_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_razor_client_packets" lineno="110518">
<summary>
Relabel packets to razor_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_razor_server_packets" lineno="110538">
<summary>
Send razor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_razor_server_packets" lineno="110557">
<summary>
Do not audit attempts to send razor_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_razor_server_packets" lineno="110576">
<summary>
Receive razor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_razor_server_packets" lineno="110595">
<summary>
Do not audit attempts to receive razor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_razor_server_packets" lineno="110614">
<summary>
Send and receive razor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_razor_server_packets" lineno="110630">
<summary>
Do not audit attempts to send and receive razor_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_razor_server_packets" lineno="110645">
<summary>
Relabel packets to razor_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_time_port" lineno="110667">
<summary>
Send and receive TCP traffic on the time port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_time_port" lineno="110686">
<summary>
Send UDP traffic on the time port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_time_port" lineno="110705">
<summary>
Do not audit attempts to send UDP traffic on the time port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_time_port" lineno="110724">
<summary>
Receive UDP traffic on the time port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_time_port" lineno="110743">
<summary>
Do not audit attempts to receive UDP traffic on the time port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_time_port" lineno="110762">
<summary>
Send and receive UDP traffic on the time port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_time_port" lineno="110779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the time port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_time_port" lineno="110795">
<summary>
Bind TCP sockets to the time port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_time_port" lineno="110815">
<summary>
Bind UDP sockets to the time port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_time_port" lineno="110835">
<summary>
Do not audit attempts to sbind to time port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_time_port" lineno="110854">
<summary>
Make a TCP connection to the time port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_time_port" lineno="110871">
<summary>
Do not audit attempts to make a TCP connection to time port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_time_client_packets" lineno="110891">
<summary>
Send time_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_time_client_packets" lineno="110910">
<summary>
Do not audit attempts to send time_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_time_client_packets" lineno="110929">
<summary>
Receive time_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_time_client_packets" lineno="110948">
<summary>
Do not audit attempts to receive time_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_time_client_packets" lineno="110967">
<summary>
Send and receive time_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_time_client_packets" lineno="110983">
<summary>
Do not audit attempts to send and receive time_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_time_client_packets" lineno="110998">
<summary>
Relabel packets to time_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_time_server_packets" lineno="111018">
<summary>
Send time_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_time_server_packets" lineno="111037">
<summary>
Do not audit attempts to send time_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_time_server_packets" lineno="111056">
<summary>
Receive time_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_time_server_packets" lineno="111075">
<summary>
Do not audit attempts to receive time_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_time_server_packets" lineno="111094">
<summary>
Send and receive time_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_time_server_packets" lineno="111110">
<summary>
Do not audit attempts to send and receive time_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_time_server_packets" lineno="111125">
<summary>
Relabel packets to time_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_redis_port" lineno="111147">
<summary>
Send and receive TCP traffic on the redis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_redis_port" lineno="111166">
<summary>
Send UDP traffic on the redis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_redis_port" lineno="111185">
<summary>
Do not audit attempts to send UDP traffic on the redis port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_redis_port" lineno="111204">
<summary>
Receive UDP traffic on the redis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_redis_port" lineno="111223">
<summary>
Do not audit attempts to receive UDP traffic on the redis port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_redis_port" lineno="111242">
<summary>
Send and receive UDP traffic on the redis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_redis_port" lineno="111259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the redis port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_redis_port" lineno="111275">
<summary>
Bind TCP sockets to the redis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_redis_port" lineno="111295">
<summary>
Bind UDP sockets to the redis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_redis_port" lineno="111315">
<summary>
Do not audit attempts to sbind to redis port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_redis_port" lineno="111334">
<summary>
Make a TCP connection to the redis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_redis_port" lineno="111351">
<summary>
Do not audit attempts to make a TCP connection to redis port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_redis_client_packets" lineno="111371">
<summary>
Send redis_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_redis_client_packets" lineno="111390">
<summary>
Do not audit attempts to send redis_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_redis_client_packets" lineno="111409">
<summary>
Receive redis_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_redis_client_packets" lineno="111428">
<summary>
Do not audit attempts to receive redis_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_redis_client_packets" lineno="111447">
<summary>
Send and receive redis_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_redis_client_packets" lineno="111463">
<summary>
Do not audit attempts to send and receive redis_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_redis_client_packets" lineno="111478">
<summary>
Relabel packets to redis_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_redis_server_packets" lineno="111498">
<summary>
Send redis_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_redis_server_packets" lineno="111517">
<summary>
Do not audit attempts to send redis_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_redis_server_packets" lineno="111536">
<summary>
Receive redis_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_redis_server_packets" lineno="111555">
<summary>
Do not audit attempts to receive redis_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_redis_server_packets" lineno="111574">
<summary>
Send and receive redis_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_redis_server_packets" lineno="111590">
<summary>
Do not audit attempts to send and receive redis_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_redis_server_packets" lineno="111605">
<summary>
Relabel packets to redis_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_repository_port" lineno="111627">
<summary>
Send and receive TCP traffic on the repository port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_repository_port" lineno="111646">
<summary>
Send UDP traffic on the repository port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_repository_port" lineno="111665">
<summary>
Do not audit attempts to send UDP traffic on the repository port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_repository_port" lineno="111684">
<summary>
Receive UDP traffic on the repository port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_repository_port" lineno="111703">
<summary>
Do not audit attempts to receive UDP traffic on the repository port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_repository_port" lineno="111722">
<summary>
Send and receive UDP traffic on the repository port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_repository_port" lineno="111739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the repository port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_repository_port" lineno="111755">
<summary>
Bind TCP sockets to the repository port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_repository_port" lineno="111775">
<summary>
Bind UDP sockets to the repository port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_repository_port" lineno="111795">
<summary>
Do not audit attempts to sbind to repository port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_repository_port" lineno="111814">
<summary>
Make a TCP connection to the repository port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_repository_port" lineno="111831">
<summary>
Do not audit attempts to make a TCP connection to repository port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_repository_client_packets" lineno="111851">
<summary>
Send repository_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_repository_client_packets" lineno="111870">
<summary>
Do not audit attempts to send repository_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_repository_client_packets" lineno="111889">
<summary>
Receive repository_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_repository_client_packets" lineno="111908">
<summary>
Do not audit attempts to receive repository_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_repository_client_packets" lineno="111927">
<summary>
Send and receive repository_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_repository_client_packets" lineno="111943">
<summary>
Do not audit attempts to send and receive repository_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_repository_client_packets" lineno="111958">
<summary>
Relabel packets to repository_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_repository_server_packets" lineno="111978">
<summary>
Send repository_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_repository_server_packets" lineno="111997">
<summary>
Do not audit attempts to send repository_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_repository_server_packets" lineno="112016">
<summary>
Receive repository_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_repository_server_packets" lineno="112035">
<summary>
Do not audit attempts to receive repository_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_repository_server_packets" lineno="112054">
<summary>
Send and receive repository_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_repository_server_packets" lineno="112070">
<summary>
Do not audit attempts to send and receive repository_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_repository_server_packets" lineno="112085">
<summary>
Relabel packets to repository_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ricci_port" lineno="112107">
<summary>
Send and receive TCP traffic on the ricci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ricci_port" lineno="112126">
<summary>
Send UDP traffic on the ricci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ricci_port" lineno="112145">
<summary>
Do not audit attempts to send UDP traffic on the ricci port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ricci_port" lineno="112164">
<summary>
Receive UDP traffic on the ricci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ricci_port" lineno="112183">
<summary>
Do not audit attempts to receive UDP traffic on the ricci port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ricci_port" lineno="112202">
<summary>
Send and receive UDP traffic on the ricci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ricci_port" lineno="112219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ricci port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ricci_port" lineno="112235">
<summary>
Bind TCP sockets to the ricci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ricci_port" lineno="112255">
<summary>
Bind UDP sockets to the ricci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ricci_port" lineno="112275">
<summary>
Do not audit attempts to sbind to ricci port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ricci_port" lineno="112294">
<summary>
Make a TCP connection to the ricci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ricci_port" lineno="112311">
<summary>
Do not audit attempts to make a TCP connection to ricci port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ricci_client_packets" lineno="112331">
<summary>
Send ricci_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ricci_client_packets" lineno="112350">
<summary>
Do not audit attempts to send ricci_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ricci_client_packets" lineno="112369">
<summary>
Receive ricci_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ricci_client_packets" lineno="112388">
<summary>
Do not audit attempts to receive ricci_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ricci_client_packets" lineno="112407">
<summary>
Send and receive ricci_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ricci_client_packets" lineno="112423">
<summary>
Do not audit attempts to send and receive ricci_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ricci_client_packets" lineno="112438">
<summary>
Relabel packets to ricci_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ricci_server_packets" lineno="112458">
<summary>
Send ricci_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ricci_server_packets" lineno="112477">
<summary>
Do not audit attempts to send ricci_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ricci_server_packets" lineno="112496">
<summary>
Receive ricci_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ricci_server_packets" lineno="112515">
<summary>
Do not audit attempts to receive ricci_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ricci_server_packets" lineno="112534">
<summary>
Send and receive ricci_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ricci_server_packets" lineno="112550">
<summary>
Do not audit attempts to send and receive ricci_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ricci_server_packets" lineno="112565">
<summary>
Relabel packets to ricci_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ricci_modcluster_port" lineno="112587">
<summary>
Send and receive TCP traffic on the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ricci_modcluster_port" lineno="112606">
<summary>
Send UDP traffic on the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ricci_modcluster_port" lineno="112625">
<summary>
Do not audit attempts to send UDP traffic on the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ricci_modcluster_port" lineno="112644">
<summary>
Receive UDP traffic on the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ricci_modcluster_port" lineno="112663">
<summary>
Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ricci_modcluster_port" lineno="112682">
<summary>
Send and receive UDP traffic on the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ricci_modcluster_port" lineno="112699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ricci_modcluster_port" lineno="112715">
<summary>
Bind TCP sockets to the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ricci_modcluster_port" lineno="112735">
<summary>
Bind UDP sockets to the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ricci_modcluster_port" lineno="112755">
<summary>
Do not audit attempts to sbind to ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ricci_modcluster_port" lineno="112774">
<summary>
Make a TCP connection to the ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ricci_modcluster_port" lineno="112791">
<summary>
Do not audit attempts to make a TCP connection to ricci_modcluster port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ricci_modcluster_client_packets" lineno="112811">
<summary>
Send ricci_modcluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ricci_modcluster_client_packets" lineno="112830">
<summary>
Do not audit attempts to send ricci_modcluster_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ricci_modcluster_client_packets" lineno="112849">
<summary>
Receive ricci_modcluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ricci_modcluster_client_packets" lineno="112868">
<summary>
Do not audit attempts to receive ricci_modcluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ricci_modcluster_client_packets" lineno="112887">
<summary>
Send and receive ricci_modcluster_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_client_packets" lineno="112903">
<summary>
Do not audit attempts to send and receive ricci_modcluster_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ricci_modcluster_client_packets" lineno="112918">
<summary>
Relabel packets to ricci_modcluster_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ricci_modcluster_server_packets" lineno="112938">
<summary>
Send ricci_modcluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ricci_modcluster_server_packets" lineno="112957">
<summary>
Do not audit attempts to send ricci_modcluster_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ricci_modcluster_server_packets" lineno="112976">
<summary>
Receive ricci_modcluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ricci_modcluster_server_packets" lineno="112995">
<summary>
Do not audit attempts to receive ricci_modcluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ricci_modcluster_server_packets" lineno="113014">
<summary>
Send and receive ricci_modcluster_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ricci_modcluster_server_packets" lineno="113030">
<summary>
Do not audit attempts to send and receive ricci_modcluster_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ricci_modcluster_server_packets" lineno="113045">
<summary>
Relabel packets to ricci_modcluster_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rlogind_port" lineno="113067">
<summary>
Send and receive TCP traffic on the rlogind port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rlogind_port" lineno="113086">
<summary>
Send UDP traffic on the rlogind port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rlogind_port" lineno="113105">
<summary>
Do not audit attempts to send UDP traffic on the rlogind port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rlogind_port" lineno="113124">
<summary>
Receive UDP traffic on the rlogind port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rlogind_port" lineno="113143">
<summary>
Do not audit attempts to receive UDP traffic on the rlogind port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rlogind_port" lineno="113162">
<summary>
Send and receive UDP traffic on the rlogind port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rlogind_port" lineno="113179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rlogind port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rlogind_port" lineno="113195">
<summary>
Bind TCP sockets to the rlogind port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rlogind_port" lineno="113215">
<summary>
Bind UDP sockets to the rlogind port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rlogind_port" lineno="113235">
<summary>
Do not audit attempts to sbind to rlogind port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rlogind_port" lineno="113254">
<summary>
Make a TCP connection to the rlogind port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rlogind_port" lineno="113271">
<summary>
Do not audit attempts to make a TCP connection to rlogind port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rlogind_client_packets" lineno="113291">
<summary>
Send rlogind_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rlogind_client_packets" lineno="113310">
<summary>
Do not audit attempts to send rlogind_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rlogind_client_packets" lineno="113329">
<summary>
Receive rlogind_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rlogind_client_packets" lineno="113348">
<summary>
Do not audit attempts to receive rlogind_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rlogind_client_packets" lineno="113367">
<summary>
Send and receive rlogind_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rlogind_client_packets" lineno="113383">
<summary>
Do not audit attempts to send and receive rlogind_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rlogind_client_packets" lineno="113398">
<summary>
Relabel packets to rlogind_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rlogind_server_packets" lineno="113418">
<summary>
Send rlogind_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rlogind_server_packets" lineno="113437">
<summary>
Do not audit attempts to send rlogind_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rlogind_server_packets" lineno="113456">
<summary>
Receive rlogind_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rlogind_server_packets" lineno="113475">
<summary>
Do not audit attempts to receive rlogind_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rlogind_server_packets" lineno="113494">
<summary>
Send and receive rlogind_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rlogind_server_packets" lineno="113510">
<summary>
Do not audit attempts to send and receive rlogind_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rlogind_server_packets" lineno="113525">
<summary>
Relabel packets to rlogind_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rndc_port" lineno="113547">
<summary>
Send and receive TCP traffic on the rndc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rndc_port" lineno="113566">
<summary>
Send UDP traffic on the rndc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rndc_port" lineno="113585">
<summary>
Do not audit attempts to send UDP traffic on the rndc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rndc_port" lineno="113604">
<summary>
Receive UDP traffic on the rndc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rndc_port" lineno="113623">
<summary>
Do not audit attempts to receive UDP traffic on the rndc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rndc_port" lineno="113642">
<summary>
Send and receive UDP traffic on the rndc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rndc_port" lineno="113659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rndc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rndc_port" lineno="113675">
<summary>
Bind TCP sockets to the rndc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rndc_port" lineno="113695">
<summary>
Bind UDP sockets to the rndc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rndc_port" lineno="113715">
<summary>
Do not audit attempts to sbind to rndc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rndc_port" lineno="113734">
<summary>
Make a TCP connection to the rndc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rndc_port" lineno="113751">
<summary>
Do not audit attempts to make a TCP connection to rndc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rndc_client_packets" lineno="113771">
<summary>
Send rndc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rndc_client_packets" lineno="113790">
<summary>
Do not audit attempts to send rndc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rndc_client_packets" lineno="113809">
<summary>
Receive rndc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rndc_client_packets" lineno="113828">
<summary>
Do not audit attempts to receive rndc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rndc_client_packets" lineno="113847">
<summary>
Send and receive rndc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rndc_client_packets" lineno="113863">
<summary>
Do not audit attempts to send and receive rndc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rndc_client_packets" lineno="113878">
<summary>
Relabel packets to rndc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rndc_server_packets" lineno="113898">
<summary>
Send rndc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rndc_server_packets" lineno="113917">
<summary>
Do not audit attempts to send rndc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rndc_server_packets" lineno="113936">
<summary>
Receive rndc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rndc_server_packets" lineno="113955">
<summary>
Do not audit attempts to receive rndc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rndc_server_packets" lineno="113974">
<summary>
Send and receive rndc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rndc_server_packets" lineno="113990">
<summary>
Do not audit attempts to send and receive rndc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rndc_server_packets" lineno="114005">
<summary>
Relabel packets to rndc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_router_port" lineno="114027">
<summary>
Send and receive TCP traffic on the router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_router_port" lineno="114046">
<summary>
Send UDP traffic on the router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_router_port" lineno="114065">
<summary>
Do not audit attempts to send UDP traffic on the router port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_router_port" lineno="114084">
<summary>
Receive UDP traffic on the router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_router_port" lineno="114103">
<summary>
Do not audit attempts to receive UDP traffic on the router port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_router_port" lineno="114122">
<summary>
Send and receive UDP traffic on the router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_router_port" lineno="114139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the router port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_router_port" lineno="114155">
<summary>
Bind TCP sockets to the router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_router_port" lineno="114175">
<summary>
Bind UDP sockets to the router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_router_port" lineno="114195">
<summary>
Do not audit attempts to sbind to router port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_router_port" lineno="114214">
<summary>
Make a TCP connection to the router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_router_port" lineno="114231">
<summary>
Do not audit attempts to make a TCP connection to router port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_router_client_packets" lineno="114251">
<summary>
Send router_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_router_client_packets" lineno="114270">
<summary>
Do not audit attempts to send router_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_router_client_packets" lineno="114289">
<summary>
Receive router_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_router_client_packets" lineno="114308">
<summary>
Do not audit attempts to receive router_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_router_client_packets" lineno="114327">
<summary>
Send and receive router_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_router_client_packets" lineno="114343">
<summary>
Do not audit attempts to send and receive router_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_router_client_packets" lineno="114358">
<summary>
Relabel packets to router_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_router_server_packets" lineno="114378">
<summary>
Send router_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_router_server_packets" lineno="114397">
<summary>
Do not audit attempts to send router_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_router_server_packets" lineno="114416">
<summary>
Receive router_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_router_server_packets" lineno="114435">
<summary>
Do not audit attempts to receive router_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_router_server_packets" lineno="114454">
<summary>
Send and receive router_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_router_server_packets" lineno="114470">
<summary>
Do not audit attempts to send and receive router_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_router_server_packets" lineno="114485">
<summary>
Relabel packets to router_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rsh_port" lineno="114507">
<summary>
Send and receive TCP traffic on the rsh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rsh_port" lineno="114526">
<summary>
Send UDP traffic on the rsh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rsh_port" lineno="114545">
<summary>
Do not audit attempts to send UDP traffic on the rsh port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rsh_port" lineno="114564">
<summary>
Receive UDP traffic on the rsh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rsh_port" lineno="114583">
<summary>
Do not audit attempts to receive UDP traffic on the rsh port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rsh_port" lineno="114602">
<summary>
Send and receive UDP traffic on the rsh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rsh_port" lineno="114619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rsh port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rsh_port" lineno="114635">
<summary>
Bind TCP sockets to the rsh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rsh_port" lineno="114655">
<summary>
Bind UDP sockets to the rsh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rsh_port" lineno="114675">
<summary>
Do not audit attempts to sbind to rsh port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rsh_port" lineno="114694">
<summary>
Make a TCP connection to the rsh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rsh_port" lineno="114711">
<summary>
Do not audit attempts to make a TCP connection to rsh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rsh_client_packets" lineno="114731">
<summary>
Send rsh_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rsh_client_packets" lineno="114750">
<summary>
Do not audit attempts to send rsh_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rsh_client_packets" lineno="114769">
<summary>
Receive rsh_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rsh_client_packets" lineno="114788">
<summary>
Do not audit attempts to receive rsh_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rsh_client_packets" lineno="114807">
<summary>
Send and receive rsh_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rsh_client_packets" lineno="114823">
<summary>
Do not audit attempts to send and receive rsh_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rsh_client_packets" lineno="114838">
<summary>
Relabel packets to rsh_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rsh_server_packets" lineno="114858">
<summary>
Send rsh_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rsh_server_packets" lineno="114877">
<summary>
Do not audit attempts to send rsh_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rsh_server_packets" lineno="114896">
<summary>
Receive rsh_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rsh_server_packets" lineno="114915">
<summary>
Do not audit attempts to receive rsh_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rsh_server_packets" lineno="114934">
<summary>
Send and receive rsh_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rsh_server_packets" lineno="114950">
<summary>
Do not audit attempts to send and receive rsh_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rsh_server_packets" lineno="114965">
<summary>
Relabel packets to rsh_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rsync_port" lineno="114987">
<summary>
Send and receive TCP traffic on the rsync port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rsync_port" lineno="115006">
<summary>
Send UDP traffic on the rsync port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rsync_port" lineno="115025">
<summary>
Do not audit attempts to send UDP traffic on the rsync port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rsync_port" lineno="115044">
<summary>
Receive UDP traffic on the rsync port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rsync_port" lineno="115063">
<summary>
Do not audit attempts to receive UDP traffic on the rsync port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rsync_port" lineno="115082">
<summary>
Send and receive UDP traffic on the rsync port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rsync_port" lineno="115099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rsync port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rsync_port" lineno="115115">
<summary>
Bind TCP sockets to the rsync port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rsync_port" lineno="115135">
<summary>
Bind UDP sockets to the rsync port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rsync_port" lineno="115155">
<summary>
Do not audit attempts to sbind to rsync port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rsync_port" lineno="115174">
<summary>
Make a TCP connection to the rsync port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rsync_port" lineno="115191">
<summary>
Do not audit attempts to make a TCP connection to rsync port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rsync_client_packets" lineno="115211">
<summary>
Send rsync_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rsync_client_packets" lineno="115230">
<summary>
Do not audit attempts to send rsync_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rsync_client_packets" lineno="115249">
<summary>
Receive rsync_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rsync_client_packets" lineno="115268">
<summary>
Do not audit attempts to receive rsync_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rsync_client_packets" lineno="115287">
<summary>
Send and receive rsync_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rsync_client_packets" lineno="115303">
<summary>
Do not audit attempts to send and receive rsync_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rsync_client_packets" lineno="115318">
<summary>
Relabel packets to rsync_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rsync_server_packets" lineno="115338">
<summary>
Send rsync_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rsync_server_packets" lineno="115357">
<summary>
Do not audit attempts to send rsync_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rsync_server_packets" lineno="115376">
<summary>
Receive rsync_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rsync_server_packets" lineno="115395">
<summary>
Do not audit attempts to receive rsync_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rsync_server_packets" lineno="115414">
<summary>
Send and receive rsync_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rsync_server_packets" lineno="115430">
<summary>
Do not audit attempts to send and receive rsync_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rsync_server_packets" lineno="115445">
<summary>
Relabel packets to rsync_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rtp_media_port" lineno="115467">
<summary>
Send and receive TCP traffic on the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rtp_media_port" lineno="115486">
<summary>
Send UDP traffic on the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rtp_media_port" lineno="115505">
<summary>
Do not audit attempts to send UDP traffic on the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rtp_media_port" lineno="115524">
<summary>
Receive UDP traffic on the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rtp_media_port" lineno="115543">
<summary>
Do not audit attempts to receive UDP traffic on the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rtp_media_port" lineno="115562">
<summary>
Send and receive UDP traffic on the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rtp_media_port" lineno="115579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rtp_media_port" lineno="115595">
<summary>
Bind TCP sockets to the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rtp_media_port" lineno="115615">
<summary>
Bind UDP sockets to the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rtp_media_port" lineno="115635">
<summary>
Do not audit attempts to sbind to rtp_media port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rtp_media_port" lineno="115654">
<summary>
Make a TCP connection to the rtp_media port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rtp_media_port" lineno="115671">
<summary>
Do not audit attempts to make a TCP connection to rtp_media port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rtp_media_client_packets" lineno="115691">
<summary>
Send rtp_media_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rtp_media_client_packets" lineno="115710">
<summary>
Do not audit attempts to send rtp_media_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rtp_media_client_packets" lineno="115729">
<summary>
Receive rtp_media_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rtp_media_client_packets" lineno="115748">
<summary>
Do not audit attempts to receive rtp_media_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rtp_media_client_packets" lineno="115767">
<summary>
Send and receive rtp_media_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rtp_media_client_packets" lineno="115783">
<summary>
Do not audit attempts to send and receive rtp_media_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rtp_media_client_packets" lineno="115798">
<summary>
Relabel packets to rtp_media_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rtp_media_server_packets" lineno="115818">
<summary>
Send rtp_media_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rtp_media_server_packets" lineno="115837">
<summary>
Do not audit attempts to send rtp_media_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rtp_media_server_packets" lineno="115856">
<summary>
Receive rtp_media_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rtp_media_server_packets" lineno="115875">
<summary>
Do not audit attempts to receive rtp_media_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rtp_media_server_packets" lineno="115894">
<summary>
Send and receive rtp_media_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rtp_media_server_packets" lineno="115910">
<summary>
Do not audit attempts to send and receive rtp_media_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rtp_media_server_packets" lineno="115925">
<summary>
Relabel packets to rtp_media_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rtsp_port" lineno="115947">
<summary>
Send and receive TCP traffic on the rtsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rtsp_port" lineno="115966">
<summary>
Send UDP traffic on the rtsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rtsp_port" lineno="115985">
<summary>
Do not audit attempts to send UDP traffic on the rtsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rtsp_port" lineno="116004">
<summary>
Receive UDP traffic on the rtsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rtsp_port" lineno="116023">
<summary>
Do not audit attempts to receive UDP traffic on the rtsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rtsp_port" lineno="116042">
<summary>
Send and receive UDP traffic on the rtsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rtsp_port" lineno="116059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rtsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rtsp_port" lineno="116075">
<summary>
Bind TCP sockets to the rtsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rtsp_port" lineno="116095">
<summary>
Bind UDP sockets to the rtsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rtsp_port" lineno="116115">
<summary>
Do not audit attempts to sbind to rtsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rtsp_port" lineno="116134">
<summary>
Make a TCP connection to the rtsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rtsp_port" lineno="116151">
<summary>
Do not audit attempts to make a TCP connection to rtsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rtsp_client_packets" lineno="116171">
<summary>
Send rtsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rtsp_client_packets" lineno="116190">
<summary>
Do not audit attempts to send rtsp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rtsp_client_packets" lineno="116209">
<summary>
Receive rtsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rtsp_client_packets" lineno="116228">
<summary>
Do not audit attempts to receive rtsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rtsp_client_packets" lineno="116247">
<summary>
Send and receive rtsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rtsp_client_packets" lineno="116263">
<summary>
Do not audit attempts to send and receive rtsp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rtsp_client_packets" lineno="116278">
<summary>
Relabel packets to rtsp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rtsp_server_packets" lineno="116298">
<summary>
Send rtsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rtsp_server_packets" lineno="116317">
<summary>
Do not audit attempts to send rtsp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rtsp_server_packets" lineno="116336">
<summary>
Receive rtsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rtsp_server_packets" lineno="116355">
<summary>
Do not audit attempts to receive rtsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rtsp_server_packets" lineno="116374">
<summary>
Send and receive rtsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rtsp_server_packets" lineno="116390">
<summary>
Do not audit attempts to send and receive rtsp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rtsp_server_packets" lineno="116405">
<summary>
Relabel packets to rtsp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_rwho_port" lineno="116427">
<summary>
Send and receive TCP traffic on the rwho port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_rwho_port" lineno="116446">
<summary>
Send UDP traffic on the rwho port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_rwho_port" lineno="116465">
<summary>
Do not audit attempts to send UDP traffic on the rwho port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_rwho_port" lineno="116484">
<summary>
Receive UDP traffic on the rwho port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_rwho_port" lineno="116503">
<summary>
Do not audit attempts to receive UDP traffic on the rwho port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_rwho_port" lineno="116522">
<summary>
Send and receive UDP traffic on the rwho port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_rwho_port" lineno="116539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the rwho port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_rwho_port" lineno="116555">
<summary>
Bind TCP sockets to the rwho port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_rwho_port" lineno="116575">
<summary>
Bind UDP sockets to the rwho port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_rwho_port" lineno="116595">
<summary>
Do not audit attempts to sbind to rwho port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_rwho_port" lineno="116614">
<summary>
Make a TCP connection to the rwho port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_rwho_port" lineno="116631">
<summary>
Do not audit attempts to make a TCP connection to rwho port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rwho_client_packets" lineno="116651">
<summary>
Send rwho_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rwho_client_packets" lineno="116670">
<summary>
Do not audit attempts to send rwho_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rwho_client_packets" lineno="116689">
<summary>
Receive rwho_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rwho_client_packets" lineno="116708">
<summary>
Do not audit attempts to receive rwho_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rwho_client_packets" lineno="116727">
<summary>
Send and receive rwho_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rwho_client_packets" lineno="116743">
<summary>
Do not audit attempts to send and receive rwho_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rwho_client_packets" lineno="116758">
<summary>
Relabel packets to rwho_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_rwho_server_packets" lineno="116778">
<summary>
Send rwho_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_rwho_server_packets" lineno="116797">
<summary>
Do not audit attempts to send rwho_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_rwho_server_packets" lineno="116816">
<summary>
Receive rwho_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_rwho_server_packets" lineno="116835">
<summary>
Do not audit attempts to receive rwho_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_rwho_server_packets" lineno="116854">
<summary>
Send and receive rwho_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_rwho_server_packets" lineno="116870">
<summary>
Do not audit attempts to send and receive rwho_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_rwho_server_packets" lineno="116885">
<summary>
Relabel packets to rwho_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_salt_port" lineno="116907">
<summary>
Send and receive TCP traffic on the salt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_salt_port" lineno="116926">
<summary>
Send UDP traffic on the salt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_salt_port" lineno="116945">
<summary>
Do not audit attempts to send UDP traffic on the salt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_salt_port" lineno="116964">
<summary>
Receive UDP traffic on the salt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_salt_port" lineno="116983">
<summary>
Do not audit attempts to receive UDP traffic on the salt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_salt_port" lineno="117002">
<summary>
Send and receive UDP traffic on the salt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_salt_port" lineno="117019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the salt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_salt_port" lineno="117035">
<summary>
Bind TCP sockets to the salt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_salt_port" lineno="117055">
<summary>
Bind UDP sockets to the salt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_salt_port" lineno="117075">
<summary>
Do not audit attempts to sbind to salt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_salt_port" lineno="117094">
<summary>
Make a TCP connection to the salt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_salt_port" lineno="117111">
<summary>
Do not audit attempts to make a TCP connection to salt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_salt_client_packets" lineno="117131">
<summary>
Send salt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_salt_client_packets" lineno="117150">
<summary>
Do not audit attempts to send salt_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_salt_client_packets" lineno="117169">
<summary>
Receive salt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_salt_client_packets" lineno="117188">
<summary>
Do not audit attempts to receive salt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_salt_client_packets" lineno="117207">
<summary>
Send and receive salt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_salt_client_packets" lineno="117223">
<summary>
Do not audit attempts to send and receive salt_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_salt_client_packets" lineno="117238">
<summary>
Relabel packets to salt_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_salt_server_packets" lineno="117258">
<summary>
Send salt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_salt_server_packets" lineno="117277">
<summary>
Do not audit attempts to send salt_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_salt_server_packets" lineno="117296">
<summary>
Receive salt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_salt_server_packets" lineno="117315">
<summary>
Do not audit attempts to receive salt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_salt_server_packets" lineno="117334">
<summary>
Send and receive salt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_salt_server_packets" lineno="117350">
<summary>
Do not audit attempts to send and receive salt_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_salt_server_packets" lineno="117365">
<summary>
Relabel packets to salt_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_sap_port" lineno="117387">
<summary>
Send and receive TCP traffic on the sap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_sap_port" lineno="117406">
<summary>
Send UDP traffic on the sap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_sap_port" lineno="117425">
<summary>
Do not audit attempts to send UDP traffic on the sap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_sap_port" lineno="117444">
<summary>
Receive UDP traffic on the sap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_sap_port" lineno="117463">
<summary>
Do not audit attempts to receive UDP traffic on the sap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_sap_port" lineno="117482">
<summary>
Send and receive UDP traffic on the sap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_sap_port" lineno="117499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_sap_port" lineno="117515">
<summary>
Bind TCP sockets to the sap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_sap_port" lineno="117535">
<summary>
Bind UDP sockets to the sap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_sap_port" lineno="117555">
<summary>
Do not audit attempts to sbind to sap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_sap_port" lineno="117574">
<summary>
Make a TCP connection to the sap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_sap_port" lineno="117591">
<summary>
Do not audit attempts to make a TCP connection to sap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sap_client_packets" lineno="117611">
<summary>
Send sap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sap_client_packets" lineno="117630">
<summary>
Do not audit attempts to send sap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sap_client_packets" lineno="117649">
<summary>
Receive sap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sap_client_packets" lineno="117668">
<summary>
Do not audit attempts to receive sap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sap_client_packets" lineno="117687">
<summary>
Send and receive sap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sap_client_packets" lineno="117703">
<summary>
Do not audit attempts to send and receive sap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sap_client_packets" lineno="117718">
<summary>
Relabel packets to sap_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sap_server_packets" lineno="117738">
<summary>
Send sap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sap_server_packets" lineno="117757">
<summary>
Do not audit attempts to send sap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sap_server_packets" lineno="117776">
<summary>
Receive sap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sap_server_packets" lineno="117795">
<summary>
Do not audit attempts to receive sap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sap_server_packets" lineno="117814">
<summary>
Send and receive sap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sap_server_packets" lineno="117830">
<summary>
Do not audit attempts to send and receive sap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sap_server_packets" lineno="117845">
<summary>
Relabel packets to sap_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_saphostctrl_port" lineno="117867">
<summary>
Send and receive TCP traffic on the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_saphostctrl_port" lineno="117886">
<summary>
Send UDP traffic on the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_saphostctrl_port" lineno="117905">
<summary>
Do not audit attempts to send UDP traffic on the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_saphostctrl_port" lineno="117924">
<summary>
Receive UDP traffic on the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_saphostctrl_port" lineno="117943">
<summary>
Do not audit attempts to receive UDP traffic on the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_saphostctrl_port" lineno="117962">
<summary>
Send and receive UDP traffic on the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_saphostctrl_port" lineno="117979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_saphostctrl_port" lineno="117995">
<summary>
Bind TCP sockets to the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_saphostctrl_port" lineno="118015">
<summary>
Bind UDP sockets to the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_saphostctrl_port" lineno="118035">
<summary>
Do not audit attempts to sbind to saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_saphostctrl_port" lineno="118054">
<summary>
Make a TCP connection to the saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_saphostctrl_port" lineno="118071">
<summary>
Do not audit attempts to make a TCP connection to saphostctrl port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_saphostctrl_client_packets" lineno="118091">
<summary>
Send saphostctrl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_saphostctrl_client_packets" lineno="118110">
<summary>
Do not audit attempts to send saphostctrl_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_saphostctrl_client_packets" lineno="118129">
<summary>
Receive saphostctrl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_saphostctrl_client_packets" lineno="118148">
<summary>
Do not audit attempts to receive saphostctrl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_saphostctrl_client_packets" lineno="118167">
<summary>
Send and receive saphostctrl_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_saphostctrl_client_packets" lineno="118183">
<summary>
Do not audit attempts to send and receive saphostctrl_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_saphostctrl_client_packets" lineno="118198">
<summary>
Relabel packets to saphostctrl_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_saphostctrl_server_packets" lineno="118218">
<summary>
Send saphostctrl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_saphostctrl_server_packets" lineno="118237">
<summary>
Do not audit attempts to send saphostctrl_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_saphostctrl_server_packets" lineno="118256">
<summary>
Receive saphostctrl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_saphostctrl_server_packets" lineno="118275">
<summary>
Do not audit attempts to receive saphostctrl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_saphostctrl_server_packets" lineno="118294">
<summary>
Send and receive saphostctrl_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_saphostctrl_server_packets" lineno="118310">
<summary>
Do not audit attempts to send and receive saphostctrl_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_saphostctrl_server_packets" lineno="118325">
<summary>
Relabel packets to saphostctrl_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_servistaitsm_port" lineno="118347">
<summary>
Send and receive TCP traffic on the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_servistaitsm_port" lineno="118366">
<summary>
Send UDP traffic on the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_servistaitsm_port" lineno="118385">
<summary>
Do not audit attempts to send UDP traffic on the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_servistaitsm_port" lineno="118404">
<summary>
Receive UDP traffic on the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_servistaitsm_port" lineno="118423">
<summary>
Do not audit attempts to receive UDP traffic on the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_servistaitsm_port" lineno="118442">
<summary>
Send and receive UDP traffic on the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_servistaitsm_port" lineno="118459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_servistaitsm_port" lineno="118475">
<summary>
Bind TCP sockets to the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_servistaitsm_port" lineno="118495">
<summary>
Bind UDP sockets to the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_servistaitsm_port" lineno="118515">
<summary>
Do not audit attempts to sbind to servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_servistaitsm_port" lineno="118534">
<summary>
Make a TCP connection to the servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_servistaitsm_port" lineno="118551">
<summary>
Do not audit attempts to make a TCP connection to servistaitsm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_servistaitsm_client_packets" lineno="118571">
<summary>
Send servistaitsm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_servistaitsm_client_packets" lineno="118590">
<summary>
Do not audit attempts to send servistaitsm_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_servistaitsm_client_packets" lineno="118609">
<summary>
Receive servistaitsm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_servistaitsm_client_packets" lineno="118628">
<summary>
Do not audit attempts to receive servistaitsm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_servistaitsm_client_packets" lineno="118647">
<summary>
Send and receive servistaitsm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_servistaitsm_client_packets" lineno="118663">
<summary>
Do not audit attempts to send and receive servistaitsm_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_servistaitsm_client_packets" lineno="118678">
<summary>
Relabel packets to servistaitsm_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_servistaitsm_server_packets" lineno="118698">
<summary>
Send servistaitsm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_servistaitsm_server_packets" lineno="118717">
<summary>
Do not audit attempts to send servistaitsm_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_servistaitsm_server_packets" lineno="118736">
<summary>
Receive servistaitsm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_servistaitsm_server_packets" lineno="118755">
<summary>
Do not audit attempts to receive servistaitsm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_servistaitsm_server_packets" lineno="118774">
<summary>
Send and receive servistaitsm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_servistaitsm_server_packets" lineno="118790">
<summary>
Do not audit attempts to send and receive servistaitsm_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_servistaitsm_server_packets" lineno="118805">
<summary>
Relabel packets to servistaitsm_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_sge_port" lineno="118827">
<summary>
Send and receive TCP traffic on the sge port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_sge_port" lineno="118846">
<summary>
Send UDP traffic on the sge port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_sge_port" lineno="118865">
<summary>
Do not audit attempts to send UDP traffic on the sge port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_sge_port" lineno="118884">
<summary>
Receive UDP traffic on the sge port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_sge_port" lineno="118903">
<summary>
Do not audit attempts to receive UDP traffic on the sge port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_sge_port" lineno="118922">
<summary>
Send and receive UDP traffic on the sge port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_sge_port" lineno="118939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sge port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_sge_port" lineno="118955">
<summary>
Bind TCP sockets to the sge port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_sge_port" lineno="118975">
<summary>
Bind UDP sockets to the sge port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_sge_port" lineno="118995">
<summary>
Do not audit attempts to sbind to sge port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_sge_port" lineno="119014">
<summary>
Make a TCP connection to the sge port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_sge_port" lineno="119031">
<summary>
Do not audit attempts to make a TCP connection to sge port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sge_client_packets" lineno="119051">
<summary>
Send sge_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sge_client_packets" lineno="119070">
<summary>
Do not audit attempts to send sge_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sge_client_packets" lineno="119089">
<summary>
Receive sge_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sge_client_packets" lineno="119108">
<summary>
Do not audit attempts to receive sge_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sge_client_packets" lineno="119127">
<summary>
Send and receive sge_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sge_client_packets" lineno="119143">
<summary>
Do not audit attempts to send and receive sge_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sge_client_packets" lineno="119158">
<summary>
Relabel packets to sge_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sge_server_packets" lineno="119178">
<summary>
Send sge_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sge_server_packets" lineno="119197">
<summary>
Do not audit attempts to send sge_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sge_server_packets" lineno="119216">
<summary>
Receive sge_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sge_server_packets" lineno="119235">
<summary>
Do not audit attempts to receive sge_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sge_server_packets" lineno="119254">
<summary>
Send and receive sge_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sge_server_packets" lineno="119270">
<summary>
Do not audit attempts to send and receive sge_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sge_server_packets" lineno="119285">
<summary>
Relabel packets to sge_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_shellinaboxd_port" lineno="119307">
<summary>
Send and receive TCP traffic on the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_shellinaboxd_port" lineno="119326">
<summary>
Send UDP traffic on the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_shellinaboxd_port" lineno="119345">
<summary>
Do not audit attempts to send UDP traffic on the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_shellinaboxd_port" lineno="119364">
<summary>
Receive UDP traffic on the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_shellinaboxd_port" lineno="119383">
<summary>
Do not audit attempts to receive UDP traffic on the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_shellinaboxd_port" lineno="119402">
<summary>
Send and receive UDP traffic on the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_shellinaboxd_port" lineno="119419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_shellinaboxd_port" lineno="119435">
<summary>
Bind TCP sockets to the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_shellinaboxd_port" lineno="119455">
<summary>
Bind UDP sockets to the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_shellinaboxd_port" lineno="119475">
<summary>
Do not audit attempts to sbind to shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_shellinaboxd_port" lineno="119494">
<summary>
Make a TCP connection to the shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_shellinaboxd_port" lineno="119511">
<summary>
Do not audit attempts to make a TCP connection to shellinaboxd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_shellinaboxd_client_packets" lineno="119531">
<summary>
Send shellinaboxd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_shellinaboxd_client_packets" lineno="119550">
<summary>
Do not audit attempts to send shellinaboxd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_shellinaboxd_client_packets" lineno="119569">
<summary>
Receive shellinaboxd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_shellinaboxd_client_packets" lineno="119588">
<summary>
Do not audit attempts to receive shellinaboxd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_shellinaboxd_client_packets" lineno="119607">
<summary>
Send and receive shellinaboxd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_shellinaboxd_client_packets" lineno="119623">
<summary>
Do not audit attempts to send and receive shellinaboxd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_shellinaboxd_client_packets" lineno="119638">
<summary>
Relabel packets to shellinaboxd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_shellinaboxd_server_packets" lineno="119658">
<summary>
Send shellinaboxd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_shellinaboxd_server_packets" lineno="119677">
<summary>
Do not audit attempts to send shellinaboxd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_shellinaboxd_server_packets" lineno="119696">
<summary>
Receive shellinaboxd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_shellinaboxd_server_packets" lineno="119715">
<summary>
Do not audit attempts to receive shellinaboxd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_shellinaboxd_server_packets" lineno="119734">
<summary>
Send and receive shellinaboxd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_shellinaboxd_server_packets" lineno="119750">
<summary>
Do not audit attempts to send and receive shellinaboxd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_shellinaboxd_server_packets" lineno="119765">
<summary>
Relabel packets to shellinaboxd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_sieve_port" lineno="119787">
<summary>
Send and receive TCP traffic on the sieve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_sieve_port" lineno="119806">
<summary>
Send UDP traffic on the sieve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_sieve_port" lineno="119825">
<summary>
Do not audit attempts to send UDP traffic on the sieve port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_sieve_port" lineno="119844">
<summary>
Receive UDP traffic on the sieve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_sieve_port" lineno="119863">
<summary>
Do not audit attempts to receive UDP traffic on the sieve port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_sieve_port" lineno="119882">
<summary>
Send and receive UDP traffic on the sieve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_sieve_port" lineno="119899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sieve port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_sieve_port" lineno="119915">
<summary>
Bind TCP sockets to the sieve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_sieve_port" lineno="119935">
<summary>
Bind UDP sockets to the sieve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_sieve_port" lineno="119955">
<summary>
Do not audit attempts to sbind to sieve port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_sieve_port" lineno="119974">
<summary>
Make a TCP connection to the sieve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_sieve_port" lineno="119991">
<summary>
Do not audit attempts to make a TCP connection to sieve port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sieve_client_packets" lineno="120011">
<summary>
Send sieve_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sieve_client_packets" lineno="120030">
<summary>
Do not audit attempts to send sieve_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sieve_client_packets" lineno="120049">
<summary>
Receive sieve_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sieve_client_packets" lineno="120068">
<summary>
Do not audit attempts to receive sieve_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sieve_client_packets" lineno="120087">
<summary>
Send and receive sieve_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sieve_client_packets" lineno="120103">
<summary>
Do not audit attempts to send and receive sieve_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sieve_client_packets" lineno="120118">
<summary>
Relabel packets to sieve_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sieve_server_packets" lineno="120138">
<summary>
Send sieve_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sieve_server_packets" lineno="120157">
<summary>
Do not audit attempts to send sieve_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sieve_server_packets" lineno="120176">
<summary>
Receive sieve_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sieve_server_packets" lineno="120195">
<summary>
Do not audit attempts to receive sieve_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sieve_server_packets" lineno="120214">
<summary>
Send and receive sieve_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sieve_server_packets" lineno="120230">
<summary>
Do not audit attempts to send and receive sieve_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sieve_server_packets" lineno="120245">
<summary>
Relabel packets to sieve_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_sip_port" lineno="120267">
<summary>
Send and receive TCP traffic on the sip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_sip_port" lineno="120286">
<summary>
Send UDP traffic on the sip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_sip_port" lineno="120305">
<summary>
Do not audit attempts to send UDP traffic on the sip port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_sip_port" lineno="120324">
<summary>
Receive UDP traffic on the sip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_sip_port" lineno="120343">
<summary>
Do not audit attempts to receive UDP traffic on the sip port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_sip_port" lineno="120362">
<summary>
Send and receive UDP traffic on the sip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_sip_port" lineno="120379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sip port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_sip_port" lineno="120395">
<summary>
Bind TCP sockets to the sip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_sip_port" lineno="120415">
<summary>
Bind UDP sockets to the sip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_sip_port" lineno="120435">
<summary>
Do not audit attempts to sbind to sip port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_sip_port" lineno="120454">
<summary>
Make a TCP connection to the sip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_sip_port" lineno="120471">
<summary>
Do not audit attempts to make a TCP connection to sip port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sip_client_packets" lineno="120491">
<summary>
Send sip_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sip_client_packets" lineno="120510">
<summary>
Do not audit attempts to send sip_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sip_client_packets" lineno="120529">
<summary>
Receive sip_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sip_client_packets" lineno="120548">
<summary>
Do not audit attempts to receive sip_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sip_client_packets" lineno="120567">
<summary>
Send and receive sip_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sip_client_packets" lineno="120583">
<summary>
Do not audit attempts to send and receive sip_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sip_client_packets" lineno="120598">
<summary>
Relabel packets to sip_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sip_server_packets" lineno="120618">
<summary>
Send sip_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sip_server_packets" lineno="120637">
<summary>
Do not audit attempts to send sip_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sip_server_packets" lineno="120656">
<summary>
Receive sip_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sip_server_packets" lineno="120675">
<summary>
Do not audit attempts to receive sip_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sip_server_packets" lineno="120694">
<summary>
Send and receive sip_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sip_server_packets" lineno="120710">
<summary>
Do not audit attempts to send and receive sip_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sip_server_packets" lineno="120725">
<summary>
Relabel packets to sip_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_sixxsconfig_port" lineno="120747">
<summary>
Send and receive TCP traffic on the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_sixxsconfig_port" lineno="120766">
<summary>
Send UDP traffic on the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_sixxsconfig_port" lineno="120785">
<summary>
Do not audit attempts to send UDP traffic on the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_sixxsconfig_port" lineno="120804">
<summary>
Receive UDP traffic on the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_sixxsconfig_port" lineno="120823">
<summary>
Do not audit attempts to receive UDP traffic on the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_sixxsconfig_port" lineno="120842">
<summary>
Send and receive UDP traffic on the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_sixxsconfig_port" lineno="120859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_sixxsconfig_port" lineno="120875">
<summary>
Bind TCP sockets to the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_sixxsconfig_port" lineno="120895">
<summary>
Bind UDP sockets to the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_sixxsconfig_port" lineno="120915">
<summary>
Do not audit attempts to sbind to sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_sixxsconfig_port" lineno="120934">
<summary>
Make a TCP connection to the sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_sixxsconfig_port" lineno="120951">
<summary>
Do not audit attempts to make a TCP connection to sixxsconfig port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sixxsconfig_client_packets" lineno="120971">
<summary>
Send sixxsconfig_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sixxsconfig_client_packets" lineno="120990">
<summary>
Do not audit attempts to send sixxsconfig_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sixxsconfig_client_packets" lineno="121009">
<summary>
Receive sixxsconfig_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sixxsconfig_client_packets" lineno="121028">
<summary>
Do not audit attempts to receive sixxsconfig_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sixxsconfig_client_packets" lineno="121047">
<summary>
Send and receive sixxsconfig_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sixxsconfig_client_packets" lineno="121063">
<summary>
Do not audit attempts to send and receive sixxsconfig_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sixxsconfig_client_packets" lineno="121078">
<summary>
Relabel packets to sixxsconfig_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sixxsconfig_server_packets" lineno="121098">
<summary>
Send sixxsconfig_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sixxsconfig_server_packets" lineno="121117">
<summary>
Do not audit attempts to send sixxsconfig_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sixxsconfig_server_packets" lineno="121136">
<summary>
Receive sixxsconfig_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sixxsconfig_server_packets" lineno="121155">
<summary>
Do not audit attempts to receive sixxsconfig_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sixxsconfig_server_packets" lineno="121174">
<summary>
Send and receive sixxsconfig_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sixxsconfig_server_packets" lineno="121190">
<summary>
Do not audit attempts to send and receive sixxsconfig_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sixxsconfig_server_packets" lineno="121205">
<summary>
Relabel packets to sixxsconfig_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_smbd_port" lineno="121227">
<summary>
Send and receive TCP traffic on the smbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_smbd_port" lineno="121246">
<summary>
Send UDP traffic on the smbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_smbd_port" lineno="121265">
<summary>
Do not audit attempts to send UDP traffic on the smbd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_smbd_port" lineno="121284">
<summary>
Receive UDP traffic on the smbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_smbd_port" lineno="121303">
<summary>
Do not audit attempts to receive UDP traffic on the smbd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_smbd_port" lineno="121322">
<summary>
Send and receive UDP traffic on the smbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_smbd_port" lineno="121339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the smbd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_smbd_port" lineno="121355">
<summary>
Bind TCP sockets to the smbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_smbd_port" lineno="121375">
<summary>
Bind UDP sockets to the smbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_smbd_port" lineno="121395">
<summary>
Do not audit attempts to sbind to smbd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_smbd_port" lineno="121414">
<summary>
Make a TCP connection to the smbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_smbd_port" lineno="121431">
<summary>
Do not audit attempts to make a TCP connection to smbd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_smbd_client_packets" lineno="121451">
<summary>
Send smbd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_smbd_client_packets" lineno="121470">
<summary>
Do not audit attempts to send smbd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_smbd_client_packets" lineno="121489">
<summary>
Receive smbd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_smbd_client_packets" lineno="121508">
<summary>
Do not audit attempts to receive smbd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_smbd_client_packets" lineno="121527">
<summary>
Send and receive smbd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_smbd_client_packets" lineno="121543">
<summary>
Do not audit attempts to send and receive smbd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_smbd_client_packets" lineno="121558">
<summary>
Relabel packets to smbd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_smbd_server_packets" lineno="121578">
<summary>
Send smbd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_smbd_server_packets" lineno="121597">
<summary>
Do not audit attempts to send smbd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_smbd_server_packets" lineno="121616">
<summary>
Receive smbd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_smbd_server_packets" lineno="121635">
<summary>
Do not audit attempts to receive smbd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_smbd_server_packets" lineno="121654">
<summary>
Send and receive smbd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_smbd_server_packets" lineno="121670">
<summary>
Do not audit attempts to send and receive smbd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_smbd_server_packets" lineno="121685">
<summary>
Relabel packets to smbd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_smtp_port" lineno="121707">
<summary>
Send and receive TCP traffic on the smtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_smtp_port" lineno="121726">
<summary>
Send UDP traffic on the smtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_smtp_port" lineno="121745">
<summary>
Do not audit attempts to send UDP traffic on the smtp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_smtp_port" lineno="121764">
<summary>
Receive UDP traffic on the smtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_smtp_port" lineno="121783">
<summary>
Do not audit attempts to receive UDP traffic on the smtp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_smtp_port" lineno="121802">
<summary>
Send and receive UDP traffic on the smtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_smtp_port" lineno="121819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the smtp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_smtp_port" lineno="121835">
<summary>
Bind TCP sockets to the smtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_smtp_port" lineno="121855">
<summary>
Bind UDP sockets to the smtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_smtp_port" lineno="121875">
<summary>
Do not audit attempts to sbind to smtp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_smtp_port" lineno="121894">
<summary>
Make a TCP connection to the smtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_smtp_port" lineno="121911">
<summary>
Do not audit attempts to make a TCP connection to smtp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_smtp_client_packets" lineno="121931">
<summary>
Send smtp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_smtp_client_packets" lineno="121950">
<summary>
Do not audit attempts to send smtp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_smtp_client_packets" lineno="121969">
<summary>
Receive smtp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_smtp_client_packets" lineno="121988">
<summary>
Do not audit attempts to receive smtp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_smtp_client_packets" lineno="122007">
<summary>
Send and receive smtp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_smtp_client_packets" lineno="122023">
<summary>
Do not audit attempts to send and receive smtp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_smtp_client_packets" lineno="122038">
<summary>
Relabel packets to smtp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_smtp_server_packets" lineno="122058">
<summary>
Send smtp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_smtp_server_packets" lineno="122077">
<summary>
Do not audit attempts to send smtp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_smtp_server_packets" lineno="122096">
<summary>
Receive smtp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_smtp_server_packets" lineno="122115">
<summary>
Do not audit attempts to receive smtp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_smtp_server_packets" lineno="122134">
<summary>
Send and receive smtp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_smtp_server_packets" lineno="122150">
<summary>
Do not audit attempts to send and receive smtp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_smtp_server_packets" lineno="122165">
<summary>
Relabel packets to smtp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_snmp_port" lineno="122187">
<summary>
Send and receive TCP traffic on the snmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_snmp_port" lineno="122206">
<summary>
Send UDP traffic on the snmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_snmp_port" lineno="122225">
<summary>
Do not audit attempts to send UDP traffic on the snmp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_snmp_port" lineno="122244">
<summary>
Receive UDP traffic on the snmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_snmp_port" lineno="122263">
<summary>
Do not audit attempts to receive UDP traffic on the snmp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_snmp_port" lineno="122282">
<summary>
Send and receive UDP traffic on the snmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_snmp_port" lineno="122299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the snmp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_snmp_port" lineno="122315">
<summary>
Bind TCP sockets to the snmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_snmp_port" lineno="122335">
<summary>
Bind UDP sockets to the snmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_snmp_port" lineno="122355">
<summary>
Do not audit attempts to sbind to snmp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_snmp_port" lineno="122374">
<summary>
Make a TCP connection to the snmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_snmp_port" lineno="122391">
<summary>
Do not audit attempts to make a TCP connection to snmp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_snmp_client_packets" lineno="122411">
<summary>
Send snmp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_snmp_client_packets" lineno="122430">
<summary>
Do not audit attempts to send snmp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_snmp_client_packets" lineno="122449">
<summary>
Receive snmp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_snmp_client_packets" lineno="122468">
<summary>
Do not audit attempts to receive snmp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_snmp_client_packets" lineno="122487">
<summary>
Send and receive snmp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_snmp_client_packets" lineno="122503">
<summary>
Do not audit attempts to send and receive snmp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_snmp_client_packets" lineno="122518">
<summary>
Relabel packets to snmp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_snmp_server_packets" lineno="122538">
<summary>
Send snmp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_snmp_server_packets" lineno="122557">
<summary>
Do not audit attempts to send snmp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_snmp_server_packets" lineno="122576">
<summary>
Receive snmp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_snmp_server_packets" lineno="122595">
<summary>
Do not audit attempts to receive snmp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_snmp_server_packets" lineno="122614">
<summary>
Send and receive snmp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_snmp_server_packets" lineno="122630">
<summary>
Do not audit attempts to send and receive snmp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_snmp_server_packets" lineno="122645">
<summary>
Relabel packets to snmp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_smntubootstrap_port" lineno="122667">
<summary>
Send and receive TCP traffic on the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_smntubootstrap_port" lineno="122686">
<summary>
Send UDP traffic on the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_smntubootstrap_port" lineno="122705">
<summary>
Do not audit attempts to send UDP traffic on the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_smntubootstrap_port" lineno="122724">
<summary>
Receive UDP traffic on the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_smntubootstrap_port" lineno="122743">
<summary>
Do not audit attempts to receive UDP traffic on the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_smntubootstrap_port" lineno="122762">
<summary>
Send and receive UDP traffic on the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_smntubootstrap_port" lineno="122779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_smntubootstrap_port" lineno="122795">
<summary>
Bind TCP sockets to the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_smntubootstrap_port" lineno="122815">
<summary>
Bind UDP sockets to the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_smntubootstrap_port" lineno="122835">
<summary>
Do not audit attempts to sbind to smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_smntubootstrap_port" lineno="122854">
<summary>
Make a TCP connection to the smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_smntubootstrap_port" lineno="122871">
<summary>
Do not audit attempts to make a TCP connection to smntubootstrap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_smntubootstrap_client_packets" lineno="122891">
<summary>
Send smntubootstrap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_smntubootstrap_client_packets" lineno="122910">
<summary>
Do not audit attempts to send smntubootstrap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_smntubootstrap_client_packets" lineno="122929">
<summary>
Receive smntubootstrap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_smntubootstrap_client_packets" lineno="122948">
<summary>
Do not audit attempts to receive smntubootstrap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_smntubootstrap_client_packets" lineno="122967">
<summary>
Send and receive smntubootstrap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_smntubootstrap_client_packets" lineno="122983">
<summary>
Do not audit attempts to send and receive smntubootstrap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_smntubootstrap_client_packets" lineno="122998">
<summary>
Relabel packets to smntubootstrap_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_smntubootstrap_server_packets" lineno="123018">
<summary>
Send smntubootstrap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_smntubootstrap_server_packets" lineno="123037">
<summary>
Do not audit attempts to send smntubootstrap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_smntubootstrap_server_packets" lineno="123056">
<summary>
Receive smntubootstrap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_smntubootstrap_server_packets" lineno="123075">
<summary>
Do not audit attempts to receive smntubootstrap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_smntubootstrap_server_packets" lineno="123094">
<summary>
Send and receive smntubootstrap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_smntubootstrap_server_packets" lineno="123110">
<summary>
Do not audit attempts to send and receive smntubootstrap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_smntubootstrap_server_packets" lineno="123125">
<summary>
Relabel packets to smntubootstrap_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_socks_port" lineno="123147">
<summary>
Send and receive TCP traffic on the socks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_socks_port" lineno="123166">
<summary>
Send UDP traffic on the socks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_socks_port" lineno="123185">
<summary>
Do not audit attempts to send UDP traffic on the socks port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_socks_port" lineno="123204">
<summary>
Receive UDP traffic on the socks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_socks_port" lineno="123223">
<summary>
Do not audit attempts to receive UDP traffic on the socks port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_socks_port" lineno="123242">
<summary>
Send and receive UDP traffic on the socks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_socks_port" lineno="123259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the socks port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_socks_port" lineno="123275">
<summary>
Bind TCP sockets to the socks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_socks_port" lineno="123295">
<summary>
Bind UDP sockets to the socks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_socks_port" lineno="123315">
<summary>
Do not audit attempts to sbind to socks port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_socks_port" lineno="123334">
<summary>
Make a TCP connection to the socks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_socks_port" lineno="123351">
<summary>
Do not audit attempts to make a TCP connection to socks port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_socks_client_packets" lineno="123371">
<summary>
Send socks_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_socks_client_packets" lineno="123390">
<summary>
Do not audit attempts to send socks_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_socks_client_packets" lineno="123409">
<summary>
Receive socks_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_socks_client_packets" lineno="123428">
<summary>
Do not audit attempts to receive socks_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_socks_client_packets" lineno="123447">
<summary>
Send and receive socks_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_socks_client_packets" lineno="123463">
<summary>
Do not audit attempts to send and receive socks_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_socks_client_packets" lineno="123478">
<summary>
Relabel packets to socks_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_socks_server_packets" lineno="123498">
<summary>
Send socks_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_socks_server_packets" lineno="123517">
<summary>
Do not audit attempts to send socks_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_socks_server_packets" lineno="123536">
<summary>
Receive socks_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_socks_server_packets" lineno="123555">
<summary>
Do not audit attempts to receive socks_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_socks_server_packets" lineno="123574">
<summary>
Send and receive socks_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_socks_server_packets" lineno="123590">
<summary>
Do not audit attempts to send and receive socks_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_socks_server_packets" lineno="123605">
<summary>
Relabel packets to socks_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_soundd_port" lineno="123627">
<summary>
Send and receive TCP traffic on the soundd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_soundd_port" lineno="123646">
<summary>
Send UDP traffic on the soundd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_soundd_port" lineno="123665">
<summary>
Do not audit attempts to send UDP traffic on the soundd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_soundd_port" lineno="123684">
<summary>
Receive UDP traffic on the soundd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_soundd_port" lineno="123703">
<summary>
Do not audit attempts to receive UDP traffic on the soundd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_soundd_port" lineno="123722">
<summary>
Send and receive UDP traffic on the soundd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_soundd_port" lineno="123739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the soundd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_soundd_port" lineno="123755">
<summary>
Bind TCP sockets to the soundd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_soundd_port" lineno="123775">
<summary>
Bind UDP sockets to the soundd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_soundd_port" lineno="123795">
<summary>
Do not audit attempts to sbind to soundd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_soundd_port" lineno="123814">
<summary>
Make a TCP connection to the soundd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_soundd_port" lineno="123831">
<summary>
Do not audit attempts to make a TCP connection to soundd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_soundd_client_packets" lineno="123851">
<summary>
Send soundd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_soundd_client_packets" lineno="123870">
<summary>
Do not audit attempts to send soundd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_soundd_client_packets" lineno="123889">
<summary>
Receive soundd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_soundd_client_packets" lineno="123908">
<summary>
Do not audit attempts to receive soundd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_soundd_client_packets" lineno="123927">
<summary>
Send and receive soundd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_soundd_client_packets" lineno="123943">
<summary>
Do not audit attempts to send and receive soundd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_soundd_client_packets" lineno="123958">
<summary>
Relabel packets to soundd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_soundd_server_packets" lineno="123978">
<summary>
Send soundd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_soundd_server_packets" lineno="123997">
<summary>
Do not audit attempts to send soundd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_soundd_server_packets" lineno="124016">
<summary>
Receive soundd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_soundd_server_packets" lineno="124035">
<summary>
Do not audit attempts to receive soundd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_soundd_server_packets" lineno="124054">
<summary>
Send and receive soundd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_soundd_server_packets" lineno="124070">
<summary>
Do not audit attempts to send and receive soundd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_soundd_server_packets" lineno="124085">
<summary>
Relabel packets to soundd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_spamd_port" lineno="124107">
<summary>
Send and receive TCP traffic on the spamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_spamd_port" lineno="124126">
<summary>
Send UDP traffic on the spamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_spamd_port" lineno="124145">
<summary>
Do not audit attempts to send UDP traffic on the spamd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_spamd_port" lineno="124164">
<summary>
Receive UDP traffic on the spamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_spamd_port" lineno="124183">
<summary>
Do not audit attempts to receive UDP traffic on the spamd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_spamd_port" lineno="124202">
<summary>
Send and receive UDP traffic on the spamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_spamd_port" lineno="124219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the spamd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_spamd_port" lineno="124235">
<summary>
Bind TCP sockets to the spamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_spamd_port" lineno="124255">
<summary>
Bind UDP sockets to the spamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_spamd_port" lineno="124275">
<summary>
Do not audit attempts to sbind to spamd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_spamd_port" lineno="124294">
<summary>
Make a TCP connection to the spamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_spamd_port" lineno="124311">
<summary>
Do not audit attempts to make a TCP connection to spamd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_spamd_client_packets" lineno="124331">
<summary>
Send spamd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_spamd_client_packets" lineno="124350">
<summary>
Do not audit attempts to send spamd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_spamd_client_packets" lineno="124369">
<summary>
Receive spamd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_spamd_client_packets" lineno="124388">
<summary>
Do not audit attempts to receive spamd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_spamd_client_packets" lineno="124407">
<summary>
Send and receive spamd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_spamd_client_packets" lineno="124423">
<summary>
Do not audit attempts to send and receive spamd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_spamd_client_packets" lineno="124438">
<summary>
Relabel packets to spamd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_spamd_server_packets" lineno="124458">
<summary>
Send spamd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_spamd_server_packets" lineno="124477">
<summary>
Do not audit attempts to send spamd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_spamd_server_packets" lineno="124496">
<summary>
Receive spamd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_spamd_server_packets" lineno="124515">
<summary>
Do not audit attempts to receive spamd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_spamd_server_packets" lineno="124534">
<summary>
Send and receive spamd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_spamd_server_packets" lineno="124550">
<summary>
Do not audit attempts to send and receive spamd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_spamd_server_packets" lineno="124565">
<summary>
Relabel packets to spamd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_speech_port" lineno="124587">
<summary>
Send and receive TCP traffic on the speech port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_speech_port" lineno="124606">
<summary>
Send UDP traffic on the speech port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_speech_port" lineno="124625">
<summary>
Do not audit attempts to send UDP traffic on the speech port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_speech_port" lineno="124644">
<summary>
Receive UDP traffic on the speech port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_speech_port" lineno="124663">
<summary>
Do not audit attempts to receive UDP traffic on the speech port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_speech_port" lineno="124682">
<summary>
Send and receive UDP traffic on the speech port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_speech_port" lineno="124699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the speech port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_speech_port" lineno="124715">
<summary>
Bind TCP sockets to the speech port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_speech_port" lineno="124735">
<summary>
Bind UDP sockets to the speech port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_speech_port" lineno="124755">
<summary>
Do not audit attempts to sbind to speech port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_speech_port" lineno="124774">
<summary>
Make a TCP connection to the speech port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_speech_port" lineno="124791">
<summary>
Do not audit attempts to make a TCP connection to speech port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_speech_client_packets" lineno="124811">
<summary>
Send speech_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_speech_client_packets" lineno="124830">
<summary>
Do not audit attempts to send speech_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_speech_client_packets" lineno="124849">
<summary>
Receive speech_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_speech_client_packets" lineno="124868">
<summary>
Do not audit attempts to receive speech_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_speech_client_packets" lineno="124887">
<summary>
Send and receive speech_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_speech_client_packets" lineno="124903">
<summary>
Do not audit attempts to send and receive speech_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_speech_client_packets" lineno="124918">
<summary>
Relabel packets to speech_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_speech_server_packets" lineno="124938">
<summary>
Send speech_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_speech_server_packets" lineno="124957">
<summary>
Do not audit attempts to send speech_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_speech_server_packets" lineno="124976">
<summary>
Receive speech_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_speech_server_packets" lineno="124995">
<summary>
Do not audit attempts to receive speech_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_speech_server_packets" lineno="125014">
<summary>
Send and receive speech_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_speech_server_packets" lineno="125030">
<summary>
Do not audit attempts to send and receive speech_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_speech_server_packets" lineno="125045">
<summary>
Relabel packets to speech_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_squid_port" lineno="125067">
<summary>
Send and receive TCP traffic on the squid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_squid_port" lineno="125086">
<summary>
Send UDP traffic on the squid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_squid_port" lineno="125105">
<summary>
Do not audit attempts to send UDP traffic on the squid port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_squid_port" lineno="125124">
<summary>
Receive UDP traffic on the squid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_squid_port" lineno="125143">
<summary>
Do not audit attempts to receive UDP traffic on the squid port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_squid_port" lineno="125162">
<summary>
Send and receive UDP traffic on the squid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_squid_port" lineno="125179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the squid port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_squid_port" lineno="125195">
<summary>
Bind TCP sockets to the squid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_squid_port" lineno="125215">
<summary>
Bind UDP sockets to the squid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_squid_port" lineno="125235">
<summary>
Do not audit attempts to sbind to squid port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_squid_port" lineno="125254">
<summary>
Make a TCP connection to the squid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_squid_port" lineno="125271">
<summary>
Do not audit attempts to make a TCP connection to squid port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_squid_client_packets" lineno="125291">
<summary>
Send squid_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_squid_client_packets" lineno="125310">
<summary>
Do not audit attempts to send squid_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_squid_client_packets" lineno="125329">
<summary>
Receive squid_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_squid_client_packets" lineno="125348">
<summary>
Do not audit attempts to receive squid_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_squid_client_packets" lineno="125367">
<summary>
Send and receive squid_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_squid_client_packets" lineno="125383">
<summary>
Do not audit attempts to send and receive squid_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_squid_client_packets" lineno="125398">
<summary>
Relabel packets to squid_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_squid_server_packets" lineno="125418">
<summary>
Send squid_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_squid_server_packets" lineno="125437">
<summary>
Do not audit attempts to send squid_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_squid_server_packets" lineno="125456">
<summary>
Receive squid_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_squid_server_packets" lineno="125475">
<summary>
Do not audit attempts to receive squid_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_squid_server_packets" lineno="125494">
<summary>
Send and receive squid_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_squid_server_packets" lineno="125510">
<summary>
Do not audit attempts to send and receive squid_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_squid_server_packets" lineno="125525">
<summary>
Relabel packets to squid_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ssdp_port" lineno="125547">
<summary>
Send and receive TCP traffic on the ssdp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ssdp_port" lineno="125566">
<summary>
Send UDP traffic on the ssdp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ssdp_port" lineno="125585">
<summary>
Do not audit attempts to send UDP traffic on the ssdp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ssdp_port" lineno="125604">
<summary>
Receive UDP traffic on the ssdp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ssdp_port" lineno="125623">
<summary>
Do not audit attempts to receive UDP traffic on the ssdp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ssdp_port" lineno="125642">
<summary>
Send and receive UDP traffic on the ssdp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ssdp_port" lineno="125659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ssdp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ssdp_port" lineno="125675">
<summary>
Bind TCP sockets to the ssdp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ssdp_port" lineno="125695">
<summary>
Bind UDP sockets to the ssdp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ssdp_port" lineno="125715">
<summary>
Do not audit attempts to sbind to ssdp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ssdp_port" lineno="125734">
<summary>
Make a TCP connection to the ssdp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ssdp_port" lineno="125751">
<summary>
Do not audit attempts to make a TCP connection to ssdp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ssdp_client_packets" lineno="125771">
<summary>
Send ssdp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ssdp_client_packets" lineno="125790">
<summary>
Do not audit attempts to send ssdp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ssdp_client_packets" lineno="125809">
<summary>
Receive ssdp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ssdp_client_packets" lineno="125828">
<summary>
Do not audit attempts to receive ssdp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ssdp_client_packets" lineno="125847">
<summary>
Send and receive ssdp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ssdp_client_packets" lineno="125863">
<summary>
Do not audit attempts to send and receive ssdp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ssdp_client_packets" lineno="125878">
<summary>
Relabel packets to ssdp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ssdp_server_packets" lineno="125898">
<summary>
Send ssdp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ssdp_server_packets" lineno="125917">
<summary>
Do not audit attempts to send ssdp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ssdp_server_packets" lineno="125936">
<summary>
Receive ssdp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ssdp_server_packets" lineno="125955">
<summary>
Do not audit attempts to receive ssdp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ssdp_server_packets" lineno="125974">
<summary>
Send and receive ssdp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ssdp_server_packets" lineno="125990">
<summary>
Do not audit attempts to send and receive ssdp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ssdp_server_packets" lineno="126005">
<summary>
Relabel packets to ssdp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ssh_port" lineno="126027">
<summary>
Send and receive TCP traffic on the ssh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ssh_port" lineno="126046">
<summary>
Send UDP traffic on the ssh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ssh_port" lineno="126065">
<summary>
Do not audit attempts to send UDP traffic on the ssh port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ssh_port" lineno="126084">
<summary>
Receive UDP traffic on the ssh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ssh_port" lineno="126103">
<summary>
Do not audit attempts to receive UDP traffic on the ssh port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ssh_port" lineno="126122">
<summary>
Send and receive UDP traffic on the ssh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ssh_port" lineno="126139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ssh port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ssh_port" lineno="126155">
<summary>
Bind TCP sockets to the ssh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ssh_port" lineno="126175">
<summary>
Bind UDP sockets to the ssh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ssh_port" lineno="126195">
<summary>
Do not audit attempts to sbind to ssh port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ssh_port" lineno="126214">
<summary>
Make a TCP connection to the ssh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ssh_port" lineno="126231">
<summary>
Do not audit attempts to make a TCP connection to ssh port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ssh_client_packets" lineno="126251">
<summary>
Send ssh_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ssh_client_packets" lineno="126270">
<summary>
Do not audit attempts to send ssh_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ssh_client_packets" lineno="126289">
<summary>
Receive ssh_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ssh_client_packets" lineno="126308">
<summary>
Do not audit attempts to receive ssh_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ssh_client_packets" lineno="126327">
<summary>
Send and receive ssh_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ssh_client_packets" lineno="126343">
<summary>
Do not audit attempts to send and receive ssh_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ssh_client_packets" lineno="126358">
<summary>
Relabel packets to ssh_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ssh_server_packets" lineno="126378">
<summary>
Send ssh_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ssh_server_packets" lineno="126397">
<summary>
Do not audit attempts to send ssh_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ssh_server_packets" lineno="126416">
<summary>
Receive ssh_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ssh_server_packets" lineno="126435">
<summary>
Do not audit attempts to receive ssh_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ssh_server_packets" lineno="126454">
<summary>
Send and receive ssh_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ssh_server_packets" lineno="126470">
<summary>
Do not audit attempts to send and receive ssh_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ssh_server_packets" lineno="126485">
<summary>
Relabel packets to ssh_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_stunnel_port" lineno="126507">
<summary>
Send and receive TCP traffic on the stunnel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_stunnel_port" lineno="126526">
<summary>
Send UDP traffic on the stunnel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_stunnel_port" lineno="126545">
<summary>
Do not audit attempts to send UDP traffic on the stunnel port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_stunnel_port" lineno="126564">
<summary>
Receive UDP traffic on the stunnel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_stunnel_port" lineno="126583">
<summary>
Do not audit attempts to receive UDP traffic on the stunnel port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_stunnel_port" lineno="126602">
<summary>
Send and receive UDP traffic on the stunnel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_stunnel_port" lineno="126619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the stunnel port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_stunnel_port" lineno="126635">
<summary>
Bind TCP sockets to the stunnel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_stunnel_port" lineno="126655">
<summary>
Bind UDP sockets to the stunnel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_stunnel_port" lineno="126675">
<summary>
Do not audit attempts to sbind to stunnel port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_stunnel_port" lineno="126694">
<summary>
Make a TCP connection to the stunnel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_stunnel_port" lineno="126711">
<summary>
Do not audit attempts to make a TCP connection to stunnel port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_stunnel_client_packets" lineno="126731">
<summary>
Send stunnel_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_stunnel_client_packets" lineno="126750">
<summary>
Do not audit attempts to send stunnel_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_stunnel_client_packets" lineno="126769">
<summary>
Receive stunnel_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_stunnel_client_packets" lineno="126788">
<summary>
Do not audit attempts to receive stunnel_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_stunnel_client_packets" lineno="126807">
<summary>
Send and receive stunnel_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_stunnel_client_packets" lineno="126823">
<summary>
Do not audit attempts to send and receive stunnel_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_stunnel_client_packets" lineno="126838">
<summary>
Relabel packets to stunnel_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_stunnel_server_packets" lineno="126858">
<summary>
Send stunnel_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_stunnel_server_packets" lineno="126877">
<summary>
Do not audit attempts to send stunnel_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_stunnel_server_packets" lineno="126896">
<summary>
Receive stunnel_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_stunnel_server_packets" lineno="126915">
<summary>
Do not audit attempts to receive stunnel_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_stunnel_server_packets" lineno="126934">
<summary>
Send and receive stunnel_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_stunnel_server_packets" lineno="126950">
<summary>
Do not audit attempts to send and receive stunnel_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_stunnel_server_packets" lineno="126965">
<summary>
Relabel packets to stunnel_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_svn_port" lineno="126987">
<summary>
Send and receive TCP traffic on the svn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_svn_port" lineno="127006">
<summary>
Send UDP traffic on the svn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_svn_port" lineno="127025">
<summary>
Do not audit attempts to send UDP traffic on the svn port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_svn_port" lineno="127044">
<summary>
Receive UDP traffic on the svn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_svn_port" lineno="127063">
<summary>
Do not audit attempts to receive UDP traffic on the svn port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_svn_port" lineno="127082">
<summary>
Send and receive UDP traffic on the svn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_svn_port" lineno="127099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the svn port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_svn_port" lineno="127115">
<summary>
Bind TCP sockets to the svn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_svn_port" lineno="127135">
<summary>
Bind UDP sockets to the svn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_svn_port" lineno="127155">
<summary>
Do not audit attempts to sbind to svn port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_svn_port" lineno="127174">
<summary>
Make a TCP connection to the svn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_svn_port" lineno="127191">
<summary>
Do not audit attempts to make a TCP connection to svn port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_svn_client_packets" lineno="127211">
<summary>
Send svn_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_svn_client_packets" lineno="127230">
<summary>
Do not audit attempts to send svn_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_svn_client_packets" lineno="127249">
<summary>
Receive svn_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_svn_client_packets" lineno="127268">
<summary>
Do not audit attempts to receive svn_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_svn_client_packets" lineno="127287">
<summary>
Send and receive svn_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_svn_client_packets" lineno="127303">
<summary>
Do not audit attempts to send and receive svn_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_svn_client_packets" lineno="127318">
<summary>
Relabel packets to svn_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_svn_server_packets" lineno="127338">
<summary>
Send svn_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_svn_server_packets" lineno="127357">
<summary>
Do not audit attempts to send svn_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_svn_server_packets" lineno="127376">
<summary>
Receive svn_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_svn_server_packets" lineno="127395">
<summary>
Do not audit attempts to receive svn_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_svn_server_packets" lineno="127414">
<summary>
Send and receive svn_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_svn_server_packets" lineno="127430">
<summary>
Do not audit attempts to send and receive svn_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_svn_server_packets" lineno="127445">
<summary>
Relabel packets to svn_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_svrloc_port" lineno="127467">
<summary>
Send and receive TCP traffic on the svrloc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_svrloc_port" lineno="127486">
<summary>
Send UDP traffic on the svrloc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_svrloc_port" lineno="127505">
<summary>
Do not audit attempts to send UDP traffic on the svrloc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_svrloc_port" lineno="127524">
<summary>
Receive UDP traffic on the svrloc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_svrloc_port" lineno="127543">
<summary>
Do not audit attempts to receive UDP traffic on the svrloc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_svrloc_port" lineno="127562">
<summary>
Send and receive UDP traffic on the svrloc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_svrloc_port" lineno="127579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the svrloc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_svrloc_port" lineno="127595">
<summary>
Bind TCP sockets to the svrloc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_svrloc_port" lineno="127615">
<summary>
Bind UDP sockets to the svrloc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_svrloc_port" lineno="127635">
<summary>
Do not audit attempts to sbind to svrloc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_svrloc_port" lineno="127654">
<summary>
Make a TCP connection to the svrloc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_svrloc_port" lineno="127671">
<summary>
Do not audit attempts to make a TCP connection to svrloc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_svrloc_client_packets" lineno="127691">
<summary>
Send svrloc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_svrloc_client_packets" lineno="127710">
<summary>
Do not audit attempts to send svrloc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_svrloc_client_packets" lineno="127729">
<summary>
Receive svrloc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_svrloc_client_packets" lineno="127748">
<summary>
Do not audit attempts to receive svrloc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_svrloc_client_packets" lineno="127767">
<summary>
Send and receive svrloc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_svrloc_client_packets" lineno="127783">
<summary>
Do not audit attempts to send and receive svrloc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_svrloc_client_packets" lineno="127798">
<summary>
Relabel packets to svrloc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_svrloc_server_packets" lineno="127818">
<summary>
Send svrloc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_svrloc_server_packets" lineno="127837">
<summary>
Do not audit attempts to send svrloc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_svrloc_server_packets" lineno="127856">
<summary>
Receive svrloc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_svrloc_server_packets" lineno="127875">
<summary>
Do not audit attempts to receive svrloc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_svrloc_server_packets" lineno="127894">
<summary>
Send and receive svrloc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_svrloc_server_packets" lineno="127910">
<summary>
Do not audit attempts to send and receive svrloc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_svrloc_server_packets" lineno="127925">
<summary>
Relabel packets to svrloc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_swat_port" lineno="127947">
<summary>
Send and receive TCP traffic on the swat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_swat_port" lineno="127966">
<summary>
Send UDP traffic on the swat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_swat_port" lineno="127985">
<summary>
Do not audit attempts to send UDP traffic on the swat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_swat_port" lineno="128004">
<summary>
Receive UDP traffic on the swat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_swat_port" lineno="128023">
<summary>
Do not audit attempts to receive UDP traffic on the swat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_swat_port" lineno="128042">
<summary>
Send and receive UDP traffic on the swat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_swat_port" lineno="128059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the swat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_swat_port" lineno="128075">
<summary>
Bind TCP sockets to the swat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_swat_port" lineno="128095">
<summary>
Bind UDP sockets to the swat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_swat_port" lineno="128115">
<summary>
Do not audit attempts to sbind to swat port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_swat_port" lineno="128134">
<summary>
Make a TCP connection to the swat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_swat_port" lineno="128151">
<summary>
Do not audit attempts to make a TCP connection to swat port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_swat_client_packets" lineno="128171">
<summary>
Send swat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_swat_client_packets" lineno="128190">
<summary>
Do not audit attempts to send swat_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_swat_client_packets" lineno="128209">
<summary>
Receive swat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_swat_client_packets" lineno="128228">
<summary>
Do not audit attempts to receive swat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_swat_client_packets" lineno="128247">
<summary>
Send and receive swat_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_swat_client_packets" lineno="128263">
<summary>
Do not audit attempts to send and receive swat_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_swat_client_packets" lineno="128278">
<summary>
Relabel packets to swat_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_swat_server_packets" lineno="128298">
<summary>
Send swat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_swat_server_packets" lineno="128317">
<summary>
Do not audit attempts to send swat_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_swat_server_packets" lineno="128336">
<summary>
Receive swat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_swat_server_packets" lineno="128355">
<summary>
Do not audit attempts to receive swat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_swat_server_packets" lineno="128374">
<summary>
Send and receive swat_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_swat_server_packets" lineno="128390">
<summary>
Do not audit attempts to send and receive swat_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_swat_server_packets" lineno="128405">
<summary>
Relabel packets to swat_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_swift_port" lineno="128427">
<summary>
Send and receive TCP traffic on the swift port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_swift_port" lineno="128446">
<summary>
Send UDP traffic on the swift port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_swift_port" lineno="128465">
<summary>
Do not audit attempts to send UDP traffic on the swift port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_swift_port" lineno="128484">
<summary>
Receive UDP traffic on the swift port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_swift_port" lineno="128503">
<summary>
Do not audit attempts to receive UDP traffic on the swift port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_swift_port" lineno="128522">
<summary>
Send and receive UDP traffic on the swift port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_swift_port" lineno="128539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the swift port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_swift_port" lineno="128555">
<summary>
Bind TCP sockets to the swift port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_swift_port" lineno="128575">
<summary>
Bind UDP sockets to the swift port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_swift_port" lineno="128595">
<summary>
Do not audit attempts to sbind to swift port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_swift_port" lineno="128614">
<summary>
Make a TCP connection to the swift port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_swift_port" lineno="128631">
<summary>
Do not audit attempts to make a TCP connection to swift port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_swift_client_packets" lineno="128651">
<summary>
Send swift_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_swift_client_packets" lineno="128670">
<summary>
Do not audit attempts to send swift_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_swift_client_packets" lineno="128689">
<summary>
Receive swift_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_swift_client_packets" lineno="128708">
<summary>
Do not audit attempts to receive swift_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_swift_client_packets" lineno="128727">
<summary>
Send and receive swift_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_swift_client_packets" lineno="128743">
<summary>
Do not audit attempts to send and receive swift_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_swift_client_packets" lineno="128758">
<summary>
Relabel packets to swift_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_swift_server_packets" lineno="128778">
<summary>
Send swift_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_swift_server_packets" lineno="128797">
<summary>
Do not audit attempts to send swift_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_swift_server_packets" lineno="128816">
<summary>
Receive swift_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_swift_server_packets" lineno="128835">
<summary>
Do not audit attempts to receive swift_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_swift_server_packets" lineno="128854">
<summary>
Send and receive swift_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_swift_server_packets" lineno="128870">
<summary>
Do not audit attempts to send and receive swift_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_swift_server_packets" lineno="128885">
<summary>
Relabel packets to swift_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_sype_transport_port" lineno="128907">
<summary>
Send and receive TCP traffic on the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_sype_transport_port" lineno="128926">
<summary>
Send UDP traffic on the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_sype_transport_port" lineno="128945">
<summary>
Do not audit attempts to send UDP traffic on the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_sype_transport_port" lineno="128964">
<summary>
Receive UDP traffic on the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_sype_transport_port" lineno="128983">
<summary>
Do not audit attempts to receive UDP traffic on the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_sype_transport_port" lineno="129002">
<summary>
Send and receive UDP traffic on the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_sype_transport_port" lineno="129019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_sype_transport_port" lineno="129035">
<summary>
Bind TCP sockets to the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_sype_transport_port" lineno="129055">
<summary>
Bind UDP sockets to the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_sype_transport_port" lineno="129075">
<summary>
Do not audit attempts to sbind to sype_transport port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_sype_transport_port" lineno="129094">
<summary>
Make a TCP connection to the sype_transport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_sype_transport_port" lineno="129111">
<summary>
Do not audit attempts to make a TCP connection to sype_transport port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sype_transport_client_packets" lineno="129131">
<summary>
Send sype_transport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sype_transport_client_packets" lineno="129150">
<summary>
Do not audit attempts to send sype_transport_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sype_transport_client_packets" lineno="129169">
<summary>
Receive sype_transport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sype_transport_client_packets" lineno="129188">
<summary>
Do not audit attempts to receive sype_transport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sype_transport_client_packets" lineno="129207">
<summary>
Send and receive sype_transport_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sype_transport_client_packets" lineno="129223">
<summary>
Do not audit attempts to send and receive sype_transport_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sype_transport_client_packets" lineno="129238">
<summary>
Relabel packets to sype_transport_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_sype_transport_server_packets" lineno="129258">
<summary>
Send sype_transport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_sype_transport_server_packets" lineno="129277">
<summary>
Do not audit attempts to send sype_transport_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_sype_transport_server_packets" lineno="129296">
<summary>
Receive sype_transport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_sype_transport_server_packets" lineno="129315">
<summary>
Do not audit attempts to receive sype_transport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_sype_transport_server_packets" lineno="129334">
<summary>
Send and receive sype_transport_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_sype_transport_server_packets" lineno="129350">
<summary>
Do not audit attempts to send and receive sype_transport_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_sype_transport_server_packets" lineno="129365">
<summary>
Relabel packets to sype_transport_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_syslogd_port" lineno="129387">
<summary>
Send and receive TCP traffic on the syslogd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_syslogd_port" lineno="129406">
<summary>
Send UDP traffic on the syslogd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_syslogd_port" lineno="129425">
<summary>
Do not audit attempts to send UDP traffic on the syslogd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_syslogd_port" lineno="129444">
<summary>
Receive UDP traffic on the syslogd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_syslogd_port" lineno="129463">
<summary>
Do not audit attempts to receive UDP traffic on the syslogd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_syslogd_port" lineno="129482">
<summary>
Send and receive UDP traffic on the syslogd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_syslogd_port" lineno="129499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syslogd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_syslogd_port" lineno="129515">
<summary>
Bind TCP sockets to the syslogd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_syslogd_port" lineno="129535">
<summary>
Bind UDP sockets to the syslogd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_syslogd_port" lineno="129555">
<summary>
Do not audit attempts to sbind to syslogd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_syslogd_port" lineno="129574">
<summary>
Make a TCP connection to the syslogd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_syslogd_port" lineno="129591">
<summary>
Do not audit attempts to make a TCP connection to syslogd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_syslogd_client_packets" lineno="129611">
<summary>
Send syslogd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_syslogd_client_packets" lineno="129630">
<summary>
Do not audit attempts to send syslogd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_syslogd_client_packets" lineno="129649">
<summary>
Receive syslogd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_syslogd_client_packets" lineno="129668">
<summary>
Do not audit attempts to receive syslogd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_syslogd_client_packets" lineno="129687">
<summary>
Send and receive syslogd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_syslogd_client_packets" lineno="129703">
<summary>
Do not audit attempts to send and receive syslogd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_syslogd_client_packets" lineno="129718">
<summary>
Relabel packets to syslogd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_syslogd_server_packets" lineno="129738">
<summary>
Send syslogd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_syslogd_server_packets" lineno="129757">
<summary>
Do not audit attempts to send syslogd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_syslogd_server_packets" lineno="129776">
<summary>
Receive syslogd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_syslogd_server_packets" lineno="129795">
<summary>
Do not audit attempts to receive syslogd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_syslogd_server_packets" lineno="129814">
<summary>
Send and receive syslogd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_syslogd_server_packets" lineno="129830">
<summary>
Do not audit attempts to send and receive syslogd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_syslogd_server_packets" lineno="129845">
<summary>
Relabel packets to syslogd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_syslog_tls_port" lineno="129867">
<summary>
Send and receive TCP traffic on the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_syslog_tls_port" lineno="129886">
<summary>
Send UDP traffic on the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_syslog_tls_port" lineno="129905">
<summary>
Do not audit attempts to send UDP traffic on the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_syslog_tls_port" lineno="129924">
<summary>
Receive UDP traffic on the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_syslog_tls_port" lineno="129943">
<summary>
Do not audit attempts to receive UDP traffic on the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_syslog_tls_port" lineno="129962">
<summary>
Send and receive UDP traffic on the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_syslog_tls_port" lineno="129979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_syslog_tls_port" lineno="129995">
<summary>
Bind TCP sockets to the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_syslog_tls_port" lineno="130015">
<summary>
Bind UDP sockets to the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_syslog_tls_port" lineno="130035">
<summary>
Do not audit attempts to sbind to syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_syslog_tls_port" lineno="130054">
<summary>
Make a TCP connection to the syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_syslog_tls_port" lineno="130071">
<summary>
Do not audit attempts to make a TCP connection to syslog_tls port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_syslog_tls_client_packets" lineno="130091">
<summary>
Send syslog_tls_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_syslog_tls_client_packets" lineno="130110">
<summary>
Do not audit attempts to send syslog_tls_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_syslog_tls_client_packets" lineno="130129">
<summary>
Receive syslog_tls_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_syslog_tls_client_packets" lineno="130148">
<summary>
Do not audit attempts to receive syslog_tls_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_syslog_tls_client_packets" lineno="130167">
<summary>
Send and receive syslog_tls_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_syslog_tls_client_packets" lineno="130183">
<summary>
Do not audit attempts to send and receive syslog_tls_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_syslog_tls_client_packets" lineno="130198">
<summary>
Relabel packets to syslog_tls_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_syslog_tls_server_packets" lineno="130218">
<summary>
Send syslog_tls_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_syslog_tls_server_packets" lineno="130237">
<summary>
Do not audit attempts to send syslog_tls_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_syslog_tls_server_packets" lineno="130256">
<summary>
Receive syslog_tls_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_syslog_tls_server_packets" lineno="130275">
<summary>
Do not audit attempts to receive syslog_tls_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_syslog_tls_server_packets" lineno="130294">
<summary>
Send and receive syslog_tls_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_syslog_tls_server_packets" lineno="130310">
<summary>
Do not audit attempts to send and receive syslog_tls_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_syslog_tls_server_packets" lineno="130325">
<summary>
Relabel packets to syslog_tls_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_statsd_port" lineno="130347">
<summary>
Send and receive TCP traffic on the statsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_statsd_port" lineno="130366">
<summary>
Send UDP traffic on the statsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_statsd_port" lineno="130385">
<summary>
Do not audit attempts to send UDP traffic on the statsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_statsd_port" lineno="130404">
<summary>
Receive UDP traffic on the statsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_statsd_port" lineno="130423">
<summary>
Do not audit attempts to receive UDP traffic on the statsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_statsd_port" lineno="130442">
<summary>
Send and receive UDP traffic on the statsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_statsd_port" lineno="130459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the statsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_statsd_port" lineno="130475">
<summary>
Bind TCP sockets to the statsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_statsd_port" lineno="130495">
<summary>
Bind UDP sockets to the statsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_statsd_port" lineno="130515">
<summary>
Do not audit attempts to sbind to statsd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_statsd_port" lineno="130534">
<summary>
Make a TCP connection to the statsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_statsd_port" lineno="130551">
<summary>
Do not audit attempts to make a TCP connection to statsd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_statsd_client_packets" lineno="130571">
<summary>
Send statsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_statsd_client_packets" lineno="130590">
<summary>
Do not audit attempts to send statsd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_statsd_client_packets" lineno="130609">
<summary>
Receive statsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_statsd_client_packets" lineno="130628">
<summary>
Do not audit attempts to receive statsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_statsd_client_packets" lineno="130647">
<summary>
Send and receive statsd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_statsd_client_packets" lineno="130663">
<summary>
Do not audit attempts to send and receive statsd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_statsd_client_packets" lineno="130678">
<summary>
Relabel packets to statsd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_statsd_server_packets" lineno="130698">
<summary>
Send statsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_statsd_server_packets" lineno="130717">
<summary>
Do not audit attempts to send statsd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_statsd_server_packets" lineno="130736">
<summary>
Receive statsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_statsd_server_packets" lineno="130755">
<summary>
Do not audit attempts to receive statsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_statsd_server_packets" lineno="130774">
<summary>
Send and receive statsd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_statsd_server_packets" lineno="130790">
<summary>
Do not audit attempts to send and receive statsd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_statsd_server_packets" lineno="130805">
<summary>
Relabel packets to statsd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_tangd_port" lineno="130827">
<summary>
Send and receive TCP traffic on the tangd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_tangd_port" lineno="130846">
<summary>
Send UDP traffic on the tangd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_tangd_port" lineno="130865">
<summary>
Do not audit attempts to send UDP traffic on the tangd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_tangd_port" lineno="130884">
<summary>
Receive UDP traffic on the tangd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_tangd_port" lineno="130903">
<summary>
Do not audit attempts to receive UDP traffic on the tangd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_tangd_port" lineno="130922">
<summary>
Send and receive UDP traffic on the tangd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_tangd_port" lineno="130939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tangd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_tangd_port" lineno="130955">
<summary>
Bind TCP sockets to the tangd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_tangd_port" lineno="130975">
<summary>
Bind UDP sockets to the tangd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_tangd_port" lineno="130995">
<summary>
Do not audit attempts to sbind to tangd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_tangd_port" lineno="131014">
<summary>
Make a TCP connection to the tangd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_tangd_port" lineno="131031">
<summary>
Do not audit attempts to make a TCP connection to tangd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tangd_client_packets" lineno="131051">
<summary>
Send tangd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tangd_client_packets" lineno="131070">
<summary>
Do not audit attempts to send tangd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tangd_client_packets" lineno="131089">
<summary>
Receive tangd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tangd_client_packets" lineno="131108">
<summary>
Do not audit attempts to receive tangd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tangd_client_packets" lineno="131127">
<summary>
Send and receive tangd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tangd_client_packets" lineno="131143">
<summary>
Do not audit attempts to send and receive tangd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tangd_client_packets" lineno="131158">
<summary>
Relabel packets to tangd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tangd_server_packets" lineno="131178">
<summary>
Send tangd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tangd_server_packets" lineno="131197">
<summary>
Do not audit attempts to send tangd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tangd_server_packets" lineno="131216">
<summary>
Receive tangd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tangd_server_packets" lineno="131235">
<summary>
Do not audit attempts to receive tangd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tangd_server_packets" lineno="131254">
<summary>
Send and receive tangd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tangd_server_packets" lineno="131270">
<summary>
Do not audit attempts to send and receive tangd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tangd_server_packets" lineno="131285">
<summary>
Relabel packets to tangd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_tcs_port" lineno="131307">
<summary>
Send and receive TCP traffic on the tcs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_tcs_port" lineno="131326">
<summary>
Send UDP traffic on the tcs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_tcs_port" lineno="131345">
<summary>
Do not audit attempts to send UDP traffic on the tcs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_tcs_port" lineno="131364">
<summary>
Receive UDP traffic on the tcs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_tcs_port" lineno="131383">
<summary>
Do not audit attempts to receive UDP traffic on the tcs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_tcs_port" lineno="131402">
<summary>
Send and receive UDP traffic on the tcs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_tcs_port" lineno="131419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tcs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_tcs_port" lineno="131435">
<summary>
Bind TCP sockets to the tcs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_tcs_port" lineno="131455">
<summary>
Bind UDP sockets to the tcs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_tcs_port" lineno="131475">
<summary>
Do not audit attempts to sbind to tcs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_tcs_port" lineno="131494">
<summary>
Make a TCP connection to the tcs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_tcs_port" lineno="131511">
<summary>
Do not audit attempts to make a TCP connection to tcs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tcs_client_packets" lineno="131531">
<summary>
Send tcs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tcs_client_packets" lineno="131550">
<summary>
Do not audit attempts to send tcs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tcs_client_packets" lineno="131569">
<summary>
Receive tcs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tcs_client_packets" lineno="131588">
<summary>
Do not audit attempts to receive tcs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tcs_client_packets" lineno="131607">
<summary>
Send and receive tcs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tcs_client_packets" lineno="131623">
<summary>
Do not audit attempts to send and receive tcs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tcs_client_packets" lineno="131638">
<summary>
Relabel packets to tcs_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tcs_server_packets" lineno="131658">
<summary>
Send tcs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tcs_server_packets" lineno="131677">
<summary>
Do not audit attempts to send tcs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tcs_server_packets" lineno="131696">
<summary>
Receive tcs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tcs_server_packets" lineno="131715">
<summary>
Do not audit attempts to receive tcs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tcs_server_packets" lineno="131734">
<summary>
Send and receive tcs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tcs_server_packets" lineno="131750">
<summary>
Do not audit attempts to send and receive tcs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tcs_server_packets" lineno="131765">
<summary>
Relabel packets to tcs_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_telnetd_port" lineno="131787">
<summary>
Send and receive TCP traffic on the telnetd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_telnetd_port" lineno="131806">
<summary>
Send UDP traffic on the telnetd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_telnetd_port" lineno="131825">
<summary>
Do not audit attempts to send UDP traffic on the telnetd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_telnetd_port" lineno="131844">
<summary>
Receive UDP traffic on the telnetd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_telnetd_port" lineno="131863">
<summary>
Do not audit attempts to receive UDP traffic on the telnetd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_telnetd_port" lineno="131882">
<summary>
Send and receive UDP traffic on the telnetd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_telnetd_port" lineno="131899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the telnetd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_telnetd_port" lineno="131915">
<summary>
Bind TCP sockets to the telnetd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_telnetd_port" lineno="131935">
<summary>
Bind UDP sockets to the telnetd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_telnetd_port" lineno="131955">
<summary>
Do not audit attempts to sbind to telnetd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_telnetd_port" lineno="131974">
<summary>
Make a TCP connection to the telnetd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_telnetd_port" lineno="131991">
<summary>
Do not audit attempts to make a TCP connection to telnetd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_telnetd_client_packets" lineno="132011">
<summary>
Send telnetd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_telnetd_client_packets" lineno="132030">
<summary>
Do not audit attempts to send telnetd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_telnetd_client_packets" lineno="132049">
<summary>
Receive telnetd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_telnetd_client_packets" lineno="132068">
<summary>
Do not audit attempts to receive telnetd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_telnetd_client_packets" lineno="132087">
<summary>
Send and receive telnetd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_telnetd_client_packets" lineno="132103">
<summary>
Do not audit attempts to send and receive telnetd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_telnetd_client_packets" lineno="132118">
<summary>
Relabel packets to telnetd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_telnetd_server_packets" lineno="132138">
<summary>
Send telnetd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_telnetd_server_packets" lineno="132157">
<summary>
Do not audit attempts to send telnetd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_telnetd_server_packets" lineno="132176">
<summary>
Receive telnetd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_telnetd_server_packets" lineno="132195">
<summary>
Do not audit attempts to receive telnetd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_telnetd_server_packets" lineno="132214">
<summary>
Send and receive telnetd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_telnetd_server_packets" lineno="132230">
<summary>
Do not audit attempts to send and receive telnetd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_telnetd_server_packets" lineno="132245">
<summary>
Relabel packets to telnetd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_tftp_port" lineno="132267">
<summary>
Send and receive TCP traffic on the tftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_tftp_port" lineno="132286">
<summary>
Send UDP traffic on the tftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_tftp_port" lineno="132305">
<summary>
Do not audit attempts to send UDP traffic on the tftp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_tftp_port" lineno="132324">
<summary>
Receive UDP traffic on the tftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_tftp_port" lineno="132343">
<summary>
Do not audit attempts to receive UDP traffic on the tftp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_tftp_port" lineno="132362">
<summary>
Send and receive UDP traffic on the tftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_tftp_port" lineno="132379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tftp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_tftp_port" lineno="132395">
<summary>
Bind TCP sockets to the tftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_tftp_port" lineno="132415">
<summary>
Bind UDP sockets to the tftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_tftp_port" lineno="132435">
<summary>
Do not audit attempts to sbind to tftp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_tftp_port" lineno="132454">
<summary>
Make a TCP connection to the tftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_tftp_port" lineno="132471">
<summary>
Do not audit attempts to make a TCP connection to tftp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tftp_client_packets" lineno="132491">
<summary>
Send tftp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tftp_client_packets" lineno="132510">
<summary>
Do not audit attempts to send tftp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tftp_client_packets" lineno="132529">
<summary>
Receive tftp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tftp_client_packets" lineno="132548">
<summary>
Do not audit attempts to receive tftp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tftp_client_packets" lineno="132567">
<summary>
Send and receive tftp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tftp_client_packets" lineno="132583">
<summary>
Do not audit attempts to send and receive tftp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tftp_client_packets" lineno="132598">
<summary>
Relabel packets to tftp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tftp_server_packets" lineno="132618">
<summary>
Send tftp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tftp_server_packets" lineno="132637">
<summary>
Do not audit attempts to send tftp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tftp_server_packets" lineno="132656">
<summary>
Receive tftp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tftp_server_packets" lineno="132675">
<summary>
Do not audit attempts to receive tftp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tftp_server_packets" lineno="132694">
<summary>
Send and receive tftp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tftp_server_packets" lineno="132710">
<summary>
Do not audit attempts to send and receive tftp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tftp_server_packets" lineno="132725">
<summary>
Relabel packets to tftp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_tor_port" lineno="132747">
<summary>
Send and receive TCP traffic on the tor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_tor_port" lineno="132766">
<summary>
Send UDP traffic on the tor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_tor_port" lineno="132785">
<summary>
Do not audit attempts to send UDP traffic on the tor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_tor_port" lineno="132804">
<summary>
Receive UDP traffic on the tor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_tor_port" lineno="132823">
<summary>
Do not audit attempts to receive UDP traffic on the tor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_tor_port" lineno="132842">
<summary>
Send and receive UDP traffic on the tor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_tor_port" lineno="132859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_tor_port" lineno="132875">
<summary>
Bind TCP sockets to the tor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_tor_port" lineno="132895">
<summary>
Bind UDP sockets to the tor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_tor_port" lineno="132915">
<summary>
Do not audit attempts to sbind to tor port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_tor_port" lineno="132934">
<summary>
Make a TCP connection to the tor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_tor_port" lineno="132951">
<summary>
Do not audit attempts to make a TCP connection to tor port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tor_client_packets" lineno="132971">
<summary>
Send tor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tor_client_packets" lineno="132990">
<summary>
Do not audit attempts to send tor_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tor_client_packets" lineno="133009">
<summary>
Receive tor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tor_client_packets" lineno="133028">
<summary>
Do not audit attempts to receive tor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tor_client_packets" lineno="133047">
<summary>
Send and receive tor_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tor_client_packets" lineno="133063">
<summary>
Do not audit attempts to send and receive tor_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tor_client_packets" lineno="133078">
<summary>
Relabel packets to tor_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tor_server_packets" lineno="133098">
<summary>
Send tor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tor_server_packets" lineno="133117">
<summary>
Do not audit attempts to send tor_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tor_server_packets" lineno="133136">
<summary>
Receive tor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tor_server_packets" lineno="133155">
<summary>
Do not audit attempts to receive tor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tor_server_packets" lineno="133174">
<summary>
Send and receive tor_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tor_server_packets" lineno="133190">
<summary>
Do not audit attempts to send and receive tor_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tor_server_packets" lineno="133205">
<summary>
Relabel packets to tor_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_traceroute_port" lineno="133227">
<summary>
Send and receive TCP traffic on the traceroute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_traceroute_port" lineno="133246">
<summary>
Send UDP traffic on the traceroute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_traceroute_port" lineno="133265">
<summary>
Do not audit attempts to send UDP traffic on the traceroute port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_traceroute_port" lineno="133284">
<summary>
Receive UDP traffic on the traceroute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_traceroute_port" lineno="133303">
<summary>
Do not audit attempts to receive UDP traffic on the traceroute port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_traceroute_port" lineno="133322">
<summary>
Send and receive UDP traffic on the traceroute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_traceroute_port" lineno="133339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the traceroute port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_traceroute_port" lineno="133355">
<summary>
Bind TCP sockets to the traceroute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_traceroute_port" lineno="133375">
<summary>
Bind UDP sockets to the traceroute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_traceroute_port" lineno="133395">
<summary>
Do not audit attempts to sbind to traceroute port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_traceroute_port" lineno="133414">
<summary>
Make a TCP connection to the traceroute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_traceroute_port" lineno="133431">
<summary>
Do not audit attempts to make a TCP connection to traceroute port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_traceroute_client_packets" lineno="133451">
<summary>
Send traceroute_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_traceroute_client_packets" lineno="133470">
<summary>
Do not audit attempts to send traceroute_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_traceroute_client_packets" lineno="133489">
<summary>
Receive traceroute_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_traceroute_client_packets" lineno="133508">
<summary>
Do not audit attempts to receive traceroute_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_traceroute_client_packets" lineno="133527">
<summary>
Send and receive traceroute_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_traceroute_client_packets" lineno="133543">
<summary>
Do not audit attempts to send and receive traceroute_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_traceroute_client_packets" lineno="133558">
<summary>
Relabel packets to traceroute_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_traceroute_server_packets" lineno="133578">
<summary>
Send traceroute_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_traceroute_server_packets" lineno="133597">
<summary>
Do not audit attempts to send traceroute_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_traceroute_server_packets" lineno="133616">
<summary>
Receive traceroute_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_traceroute_server_packets" lineno="133635">
<summary>
Do not audit attempts to receive traceroute_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_traceroute_server_packets" lineno="133654">
<summary>
Send and receive traceroute_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_traceroute_server_packets" lineno="133670">
<summary>
Do not audit attempts to send and receive traceroute_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_traceroute_server_packets" lineno="133685">
<summary>
Relabel packets to traceroute_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_tram_port" lineno="133707">
<summary>
Send and receive TCP traffic on the tram port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_tram_port" lineno="133726">
<summary>
Send UDP traffic on the tram port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_tram_port" lineno="133745">
<summary>
Do not audit attempts to send UDP traffic on the tram port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_tram_port" lineno="133764">
<summary>
Receive UDP traffic on the tram port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_tram_port" lineno="133783">
<summary>
Do not audit attempts to receive UDP traffic on the tram port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_tram_port" lineno="133802">
<summary>
Send and receive UDP traffic on the tram port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_tram_port" lineno="133819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the tram port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_tram_port" lineno="133835">
<summary>
Bind TCP sockets to the tram port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_tram_port" lineno="133855">
<summary>
Bind UDP sockets to the tram port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_tram_port" lineno="133875">
<summary>
Do not audit attempts to sbind to tram port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_tram_port" lineno="133894">
<summary>
Make a TCP connection to the tram port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_tram_port" lineno="133911">
<summary>
Do not audit attempts to make a TCP connection to tram port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tram_client_packets" lineno="133931">
<summary>
Send tram_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tram_client_packets" lineno="133950">
<summary>
Do not audit attempts to send tram_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tram_client_packets" lineno="133969">
<summary>
Receive tram_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tram_client_packets" lineno="133988">
<summary>
Do not audit attempts to receive tram_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tram_client_packets" lineno="134007">
<summary>
Send and receive tram_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tram_client_packets" lineno="134023">
<summary>
Do not audit attempts to send and receive tram_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tram_client_packets" lineno="134038">
<summary>
Relabel packets to tram_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_tram_server_packets" lineno="134058">
<summary>
Send tram_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_tram_server_packets" lineno="134077">
<summary>
Do not audit attempts to send tram_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_tram_server_packets" lineno="134096">
<summary>
Receive tram_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_tram_server_packets" lineno="134115">
<summary>
Do not audit attempts to receive tram_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_tram_server_packets" lineno="134134">
<summary>
Send and receive tram_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_tram_server_packets" lineno="134150">
<summary>
Do not audit attempts to send and receive tram_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_tram_server_packets" lineno="134165">
<summary>
Relabel packets to tram_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_transproxy_port" lineno="134187">
<summary>
Send and receive TCP traffic on the transproxy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_transproxy_port" lineno="134206">
<summary>
Send UDP traffic on the transproxy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_transproxy_port" lineno="134225">
<summary>
Do not audit attempts to send UDP traffic on the transproxy port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_transproxy_port" lineno="134244">
<summary>
Receive UDP traffic on the transproxy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_transproxy_port" lineno="134263">
<summary>
Do not audit attempts to receive UDP traffic on the transproxy port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_transproxy_port" lineno="134282">
<summary>
Send and receive UDP traffic on the transproxy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_transproxy_port" lineno="134299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the transproxy port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_transproxy_port" lineno="134315">
<summary>
Bind TCP sockets to the transproxy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_transproxy_port" lineno="134335">
<summary>
Bind UDP sockets to the transproxy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_transproxy_port" lineno="134355">
<summary>
Do not audit attempts to sbind to transproxy port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_transproxy_port" lineno="134374">
<summary>
Make a TCP connection to the transproxy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_transproxy_port" lineno="134391">
<summary>
Do not audit attempts to make a TCP connection to transproxy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_transproxy_client_packets" lineno="134411">
<summary>
Send transproxy_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_transproxy_client_packets" lineno="134430">
<summary>
Do not audit attempts to send transproxy_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_transproxy_client_packets" lineno="134449">
<summary>
Receive transproxy_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_transproxy_client_packets" lineno="134468">
<summary>
Do not audit attempts to receive transproxy_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_transproxy_client_packets" lineno="134487">
<summary>
Send and receive transproxy_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_transproxy_client_packets" lineno="134503">
<summary>
Do not audit attempts to send and receive transproxy_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_transproxy_client_packets" lineno="134518">
<summary>
Relabel packets to transproxy_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_transproxy_server_packets" lineno="134538">
<summary>
Send transproxy_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_transproxy_server_packets" lineno="134557">
<summary>
Do not audit attempts to send transproxy_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_transproxy_server_packets" lineno="134576">
<summary>
Receive transproxy_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_transproxy_server_packets" lineno="134595">
<summary>
Do not audit attempts to receive transproxy_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_transproxy_server_packets" lineno="134614">
<summary>
Send and receive transproxy_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_transproxy_server_packets" lineno="134630">
<summary>
Do not audit attempts to send and receive transproxy_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_transproxy_server_packets" lineno="134645">
<summary>
Relabel packets to transproxy_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_trisoap_port" lineno="134667">
<summary>
Send and receive TCP traffic on the trisoap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_trisoap_port" lineno="134686">
<summary>
Send UDP traffic on the trisoap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_trisoap_port" lineno="134705">
<summary>
Do not audit attempts to send UDP traffic on the trisoap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_trisoap_port" lineno="134724">
<summary>
Receive UDP traffic on the trisoap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_trisoap_port" lineno="134743">
<summary>
Do not audit attempts to receive UDP traffic on the trisoap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_trisoap_port" lineno="134762">
<summary>
Send and receive UDP traffic on the trisoap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_trisoap_port" lineno="134779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the trisoap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_trisoap_port" lineno="134795">
<summary>
Bind TCP sockets to the trisoap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_trisoap_port" lineno="134815">
<summary>
Bind UDP sockets to the trisoap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_trisoap_port" lineno="134835">
<summary>
Do not audit attempts to sbind to trisoap port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_trisoap_port" lineno="134854">
<summary>
Make a TCP connection to the trisoap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_trisoap_port" lineno="134871">
<summary>
Do not audit attempts to make a TCP connection to trisoap port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_trisoap_client_packets" lineno="134891">
<summary>
Send trisoap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_trisoap_client_packets" lineno="134910">
<summary>
Do not audit attempts to send trisoap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_trisoap_client_packets" lineno="134929">
<summary>
Receive trisoap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_trisoap_client_packets" lineno="134948">
<summary>
Do not audit attempts to receive trisoap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_trisoap_client_packets" lineno="134967">
<summary>
Send and receive trisoap_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_trisoap_client_packets" lineno="134983">
<summary>
Do not audit attempts to send and receive trisoap_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_trisoap_client_packets" lineno="134998">
<summary>
Relabel packets to trisoap_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_trisoap_server_packets" lineno="135018">
<summary>
Send trisoap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_trisoap_server_packets" lineno="135037">
<summary>
Do not audit attempts to send trisoap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_trisoap_server_packets" lineno="135056">
<summary>
Receive trisoap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_trisoap_server_packets" lineno="135075">
<summary>
Do not audit attempts to receive trisoap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_trisoap_server_packets" lineno="135094">
<summary>
Send and receive trisoap_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_trisoap_server_packets" lineno="135110">
<summary>
Do not audit attempts to send and receive trisoap_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_trisoap_server_packets" lineno="135125">
<summary>
Relabel packets to trisoap_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_trivnet1_port" lineno="135147">
<summary>
Send and receive TCP traffic on the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_trivnet1_port" lineno="135166">
<summary>
Send UDP traffic on the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_trivnet1_port" lineno="135185">
<summary>
Do not audit attempts to send UDP traffic on the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_trivnet1_port" lineno="135204">
<summary>
Receive UDP traffic on the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_trivnet1_port" lineno="135223">
<summary>
Do not audit attempts to receive UDP traffic on the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_trivnet1_port" lineno="135242">
<summary>
Send and receive UDP traffic on the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_trivnet1_port" lineno="135259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_trivnet1_port" lineno="135275">
<summary>
Bind TCP sockets to the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_trivnet1_port" lineno="135295">
<summary>
Bind UDP sockets to the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_trivnet1_port" lineno="135315">
<summary>
Do not audit attempts to sbind to trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_trivnet1_port" lineno="135334">
<summary>
Make a TCP connection to the trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_trivnet1_port" lineno="135351">
<summary>
Do not audit attempts to make a TCP connection to trivnet1 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_trivnet1_client_packets" lineno="135371">
<summary>
Send trivnet1_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_trivnet1_client_packets" lineno="135390">
<summary>
Do not audit attempts to send trivnet1_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_trivnet1_client_packets" lineno="135409">
<summary>
Receive trivnet1_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_trivnet1_client_packets" lineno="135428">
<summary>
Do not audit attempts to receive trivnet1_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_trivnet1_client_packets" lineno="135447">
<summary>
Send and receive trivnet1_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_trivnet1_client_packets" lineno="135463">
<summary>
Do not audit attempts to send and receive trivnet1_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_trivnet1_client_packets" lineno="135478">
<summary>
Relabel packets to trivnet1_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_trivnet1_server_packets" lineno="135498">
<summary>
Send trivnet1_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_trivnet1_server_packets" lineno="135517">
<summary>
Do not audit attempts to send trivnet1_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_trivnet1_server_packets" lineno="135536">
<summary>
Receive trivnet1_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_trivnet1_server_packets" lineno="135555">
<summary>
Do not audit attempts to receive trivnet1_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_trivnet1_server_packets" lineno="135574">
<summary>
Send and receive trivnet1_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_trivnet1_server_packets" lineno="135590">
<summary>
Do not audit attempts to send and receive trivnet1_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_trivnet1_server_packets" lineno="135605">
<summary>
Relabel packets to trivnet1_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_ups_port" lineno="135627">
<summary>
Send and receive TCP traffic on the ups port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_ups_port" lineno="135646">
<summary>
Send UDP traffic on the ups port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_ups_port" lineno="135665">
<summary>
Do not audit attempts to send UDP traffic on the ups port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_ups_port" lineno="135684">
<summary>
Receive UDP traffic on the ups port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_ups_port" lineno="135703">
<summary>
Do not audit attempts to receive UDP traffic on the ups port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_ups_port" lineno="135722">
<summary>
Send and receive UDP traffic on the ups port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_ups_port" lineno="135739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the ups port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_ups_port" lineno="135755">
<summary>
Bind TCP sockets to the ups port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_ups_port" lineno="135775">
<summary>
Bind UDP sockets to the ups port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_ups_port" lineno="135795">
<summary>
Do not audit attempts to sbind to ups port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_ups_port" lineno="135814">
<summary>
Make a TCP connection to the ups port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_ups_port" lineno="135831">
<summary>
Do not audit attempts to make a TCP connection to ups port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ups_client_packets" lineno="135851">
<summary>
Send ups_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ups_client_packets" lineno="135870">
<summary>
Do not audit attempts to send ups_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ups_client_packets" lineno="135889">
<summary>
Receive ups_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ups_client_packets" lineno="135908">
<summary>
Do not audit attempts to receive ups_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ups_client_packets" lineno="135927">
<summary>
Send and receive ups_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ups_client_packets" lineno="135943">
<summary>
Do not audit attempts to send and receive ups_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ups_client_packets" lineno="135958">
<summary>
Relabel packets to ups_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_ups_server_packets" lineno="135978">
<summary>
Send ups_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_ups_server_packets" lineno="135997">
<summary>
Do not audit attempts to send ups_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_ups_server_packets" lineno="136016">
<summary>
Receive ups_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_ups_server_packets" lineno="136035">
<summary>
Do not audit attempts to receive ups_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_ups_server_packets" lineno="136054">
<summary>
Send and receive ups_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_ups_server_packets" lineno="136070">
<summary>
Do not audit attempts to send and receive ups_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_ups_server_packets" lineno="136085">
<summary>
Relabel packets to ups_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_utcpserver_port" lineno="136107">
<summary>
Send and receive TCP traffic on the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_utcpserver_port" lineno="136126">
<summary>
Send UDP traffic on the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_utcpserver_port" lineno="136145">
<summary>
Do not audit attempts to send UDP traffic on the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_utcpserver_port" lineno="136164">
<summary>
Receive UDP traffic on the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_utcpserver_port" lineno="136183">
<summary>
Do not audit attempts to receive UDP traffic on the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_utcpserver_port" lineno="136202">
<summary>
Send and receive UDP traffic on the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_utcpserver_port" lineno="136219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_utcpserver_port" lineno="136235">
<summary>
Bind TCP sockets to the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_utcpserver_port" lineno="136255">
<summary>
Bind UDP sockets to the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_utcpserver_port" lineno="136275">
<summary>
Do not audit attempts to sbind to utcpserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_utcpserver_port" lineno="136294">
<summary>
Make a TCP connection to the utcpserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_utcpserver_port" lineno="136311">
<summary>
Do not audit attempts to make a TCP connection to utcpserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_utcpserver_client_packets" lineno="136331">
<summary>
Send utcpserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_utcpserver_client_packets" lineno="136350">
<summary>
Do not audit attempts to send utcpserver_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_utcpserver_client_packets" lineno="136369">
<summary>
Receive utcpserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_utcpserver_client_packets" lineno="136388">
<summary>
Do not audit attempts to receive utcpserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_utcpserver_client_packets" lineno="136407">
<summary>
Send and receive utcpserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_utcpserver_client_packets" lineno="136423">
<summary>
Do not audit attempts to send and receive utcpserver_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_utcpserver_client_packets" lineno="136438">
<summary>
Relabel packets to utcpserver_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_utcpserver_server_packets" lineno="136458">
<summary>
Send utcpserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_utcpserver_server_packets" lineno="136477">
<summary>
Do not audit attempts to send utcpserver_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_utcpserver_server_packets" lineno="136496">
<summary>
Receive utcpserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_utcpserver_server_packets" lineno="136515">
<summary>
Do not audit attempts to receive utcpserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_utcpserver_server_packets" lineno="136534">
<summary>
Send and receive utcpserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_utcpserver_server_packets" lineno="136550">
<summary>
Do not audit attempts to send and receive utcpserver_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_utcpserver_server_packets" lineno="136565">
<summary>
Relabel packets to utcpserver_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_uucpd_port" lineno="136587">
<summary>
Send and receive TCP traffic on the uucpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_uucpd_port" lineno="136606">
<summary>
Send UDP traffic on the uucpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_uucpd_port" lineno="136625">
<summary>
Do not audit attempts to send UDP traffic on the uucpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_uucpd_port" lineno="136644">
<summary>
Receive UDP traffic on the uucpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_uucpd_port" lineno="136663">
<summary>
Do not audit attempts to receive UDP traffic on the uucpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_uucpd_port" lineno="136682">
<summary>
Send and receive UDP traffic on the uucpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_uucpd_port" lineno="136699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the uucpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_uucpd_port" lineno="136715">
<summary>
Bind TCP sockets to the uucpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_uucpd_port" lineno="136735">
<summary>
Bind UDP sockets to the uucpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_uucpd_port" lineno="136755">
<summary>
Do not audit attempts to sbind to uucpd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_uucpd_port" lineno="136774">
<summary>
Make a TCP connection to the uucpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_uucpd_port" lineno="136791">
<summary>
Do not audit attempts to make a TCP connection to uucpd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_uucpd_client_packets" lineno="136811">
<summary>
Send uucpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_uucpd_client_packets" lineno="136830">
<summary>
Do not audit attempts to send uucpd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_uucpd_client_packets" lineno="136849">
<summary>
Receive uucpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_uucpd_client_packets" lineno="136868">
<summary>
Do not audit attempts to receive uucpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_uucpd_client_packets" lineno="136887">
<summary>
Send and receive uucpd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_uucpd_client_packets" lineno="136903">
<summary>
Do not audit attempts to send and receive uucpd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_uucpd_client_packets" lineno="136918">
<summary>
Relabel packets to uucpd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_uucpd_server_packets" lineno="136938">
<summary>
Send uucpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_uucpd_server_packets" lineno="136957">
<summary>
Do not audit attempts to send uucpd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_uucpd_server_packets" lineno="136976">
<summary>
Receive uucpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_uucpd_server_packets" lineno="136995">
<summary>
Do not audit attempts to receive uucpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_uucpd_server_packets" lineno="137014">
<summary>
Send and receive uucpd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_uucpd_server_packets" lineno="137030">
<summary>
Do not audit attempts to send and receive uucpd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_uucpd_server_packets" lineno="137045">
<summary>
Relabel packets to uucpd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_us_cli_port" lineno="137067">
<summary>
Send and receive TCP traffic on the us_cli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_us_cli_port" lineno="137086">
<summary>
Send UDP traffic on the us_cli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_us_cli_port" lineno="137105">
<summary>
Do not audit attempts to send UDP traffic on the us_cli port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_us_cli_port" lineno="137124">
<summary>
Receive UDP traffic on the us_cli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_us_cli_port" lineno="137143">
<summary>
Do not audit attempts to receive UDP traffic on the us_cli port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_us_cli_port" lineno="137162">
<summary>
Send and receive UDP traffic on the us_cli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_us_cli_port" lineno="137179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the us_cli port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_us_cli_port" lineno="137195">
<summary>
Bind TCP sockets to the us_cli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_us_cli_port" lineno="137215">
<summary>
Bind UDP sockets to the us_cli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_us_cli_port" lineno="137235">
<summary>
Do not audit attempts to sbind to us_cli port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_us_cli_port" lineno="137254">
<summary>
Make a TCP connection to the us_cli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_us_cli_port" lineno="137271">
<summary>
Do not audit attempts to make a TCP connection to us_cli port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_us_cli_client_packets" lineno="137291">
<summary>
Send us_cli_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_us_cli_client_packets" lineno="137310">
<summary>
Do not audit attempts to send us_cli_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_us_cli_client_packets" lineno="137329">
<summary>
Receive us_cli_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_us_cli_client_packets" lineno="137348">
<summary>
Do not audit attempts to receive us_cli_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_us_cli_client_packets" lineno="137367">
<summary>
Send and receive us_cli_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_us_cli_client_packets" lineno="137383">
<summary>
Do not audit attempts to send and receive us_cli_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_us_cli_client_packets" lineno="137398">
<summary>
Relabel packets to us_cli_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_us_cli_server_packets" lineno="137418">
<summary>
Send us_cli_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_us_cli_server_packets" lineno="137437">
<summary>
Do not audit attempts to send us_cli_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_us_cli_server_packets" lineno="137456">
<summary>
Receive us_cli_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_us_cli_server_packets" lineno="137475">
<summary>
Do not audit attempts to receive us_cli_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_us_cli_server_packets" lineno="137494">
<summary>
Send and receive us_cli_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_us_cli_server_packets" lineno="137510">
<summary>
Do not audit attempts to send and receive us_cli_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_us_cli_server_packets" lineno="137525">
<summary>
Relabel packets to us_cli_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_varnishd_port" lineno="137547">
<summary>
Send and receive TCP traffic on the varnishd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_varnishd_port" lineno="137566">
<summary>
Send UDP traffic on the varnishd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_varnishd_port" lineno="137585">
<summary>
Do not audit attempts to send UDP traffic on the varnishd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_varnishd_port" lineno="137604">
<summary>
Receive UDP traffic on the varnishd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_varnishd_port" lineno="137623">
<summary>
Do not audit attempts to receive UDP traffic on the varnishd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_varnishd_port" lineno="137642">
<summary>
Send and receive UDP traffic on the varnishd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_varnishd_port" lineno="137659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the varnishd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_varnishd_port" lineno="137675">
<summary>
Bind TCP sockets to the varnishd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_varnishd_port" lineno="137695">
<summary>
Bind UDP sockets to the varnishd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_varnishd_port" lineno="137715">
<summary>
Do not audit attempts to sbind to varnishd port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_varnishd_port" lineno="137734">
<summary>
Make a TCP connection to the varnishd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_varnishd_port" lineno="137751">
<summary>
Do not audit attempts to make a TCP connection to varnishd port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_varnishd_client_packets" lineno="137771">
<summary>
Send varnishd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_varnishd_client_packets" lineno="137790">
<summary>
Do not audit attempts to send varnishd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_varnishd_client_packets" lineno="137809">
<summary>
Receive varnishd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_varnishd_client_packets" lineno="137828">
<summary>
Do not audit attempts to receive varnishd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_varnishd_client_packets" lineno="137847">
<summary>
Send and receive varnishd_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_varnishd_client_packets" lineno="137863">
<summary>
Do not audit attempts to send and receive varnishd_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_varnishd_client_packets" lineno="137878">
<summary>
Relabel packets to varnishd_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_varnishd_server_packets" lineno="137898">
<summary>
Send varnishd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_varnishd_server_packets" lineno="137917">
<summary>
Do not audit attempts to send varnishd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_varnishd_server_packets" lineno="137936">
<summary>
Receive varnishd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_varnishd_server_packets" lineno="137955">
<summary>
Do not audit attempts to receive varnishd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_varnishd_server_packets" lineno="137974">
<summary>
Send and receive varnishd_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_varnishd_server_packets" lineno="137990">
<summary>
Do not audit attempts to send and receive varnishd_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_varnishd_server_packets" lineno="138005">
<summary>
Relabel packets to varnishd_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_versa_tek_port" lineno="138027">
<summary>
Send and receive TCP traffic on the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_versa_tek_port" lineno="138046">
<summary>
Send UDP traffic on the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_versa_tek_port" lineno="138065">
<summary>
Do not audit attempts to send UDP traffic on the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_versa_tek_port" lineno="138084">
<summary>
Receive UDP traffic on the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_versa_tek_port" lineno="138103">
<summary>
Do not audit attempts to receive UDP traffic on the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_versa_tek_port" lineno="138122">
<summary>
Send and receive UDP traffic on the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_versa_tek_port" lineno="138139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_versa_tek_port" lineno="138155">
<summary>
Bind TCP sockets to the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_versa_tek_port" lineno="138175">
<summary>
Bind UDP sockets to the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_versa_tek_port" lineno="138195">
<summary>
Do not audit attempts to sbind to versa_tek port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_versa_tek_port" lineno="138214">
<summary>
Make a TCP connection to the versa_tek port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_versa_tek_port" lineno="138231">
<summary>
Do not audit attempts to make a TCP connection to versa_tek port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_versa_tek_client_packets" lineno="138251">
<summary>
Send versa_tek_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_versa_tek_client_packets" lineno="138270">
<summary>
Do not audit attempts to send versa_tek_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_versa_tek_client_packets" lineno="138289">
<summary>
Receive versa_tek_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_versa_tek_client_packets" lineno="138308">
<summary>
Do not audit attempts to receive versa_tek_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_versa_tek_client_packets" lineno="138327">
<summary>
Send and receive versa_tek_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_versa_tek_client_packets" lineno="138343">
<summary>
Do not audit attempts to send and receive versa_tek_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_versa_tek_client_packets" lineno="138358">
<summary>
Relabel packets to versa_tek_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_versa_tek_server_packets" lineno="138378">
<summary>
Send versa_tek_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_versa_tek_server_packets" lineno="138397">
<summary>
Do not audit attempts to send versa_tek_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_versa_tek_server_packets" lineno="138416">
<summary>
Receive versa_tek_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_versa_tek_server_packets" lineno="138435">
<summary>
Do not audit attempts to receive versa_tek_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_versa_tek_server_packets" lineno="138454">
<summary>
Send and receive versa_tek_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_versa_tek_server_packets" lineno="138470">
<summary>
Do not audit attempts to send and receive versa_tek_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_versa_tek_server_packets" lineno="138485">
<summary>
Relabel packets to versa_tek_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_virt_port" lineno="138507">
<summary>
Send and receive TCP traffic on the virt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_virt_port" lineno="138526">
<summary>
Send UDP traffic on the virt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_virt_port" lineno="138545">
<summary>
Do not audit attempts to send UDP traffic on the virt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_virt_port" lineno="138564">
<summary>
Receive UDP traffic on the virt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_virt_port" lineno="138583">
<summary>
Do not audit attempts to receive UDP traffic on the virt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_virt_port" lineno="138602">
<summary>
Send and receive UDP traffic on the virt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_virt_port" lineno="138619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_virt_port" lineno="138635">
<summary>
Bind TCP sockets to the virt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_virt_port" lineno="138655">
<summary>
Bind UDP sockets to the virt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_virt_port" lineno="138675">
<summary>
Do not audit attempts to sbind to virt port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_virt_port" lineno="138694">
<summary>
Make a TCP connection to the virt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_virt_port" lineno="138711">
<summary>
Do not audit attempts to make a TCP connection to virt port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_virt_client_packets" lineno="138731">
<summary>
Send virt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_virt_client_packets" lineno="138750">
<summary>
Do not audit attempts to send virt_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_virt_client_packets" lineno="138769">
<summary>
Receive virt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_virt_client_packets" lineno="138788">
<summary>
Do not audit attempts to receive virt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_virt_client_packets" lineno="138807">
<summary>
Send and receive virt_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_virt_client_packets" lineno="138823">
<summary>
Do not audit attempts to send and receive virt_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_virt_client_packets" lineno="138838">
<summary>
Relabel packets to virt_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_virt_server_packets" lineno="138858">
<summary>
Send virt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_virt_server_packets" lineno="138877">
<summary>
Do not audit attempts to send virt_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_virt_server_packets" lineno="138896">
<summary>
Receive virt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_virt_server_packets" lineno="138915">
<summary>
Do not audit attempts to receive virt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_virt_server_packets" lineno="138934">
<summary>
Send and receive virt_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_virt_server_packets" lineno="138950">
<summary>
Do not audit attempts to send and receive virt_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_virt_server_packets" lineno="138965">
<summary>
Relabel packets to virt_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_virtual_places_port" lineno="138987">
<summary>
Send and receive TCP traffic on the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_virtual_places_port" lineno="139006">
<summary>
Send UDP traffic on the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_virtual_places_port" lineno="139025">
<summary>
Do not audit attempts to send UDP traffic on the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_virtual_places_port" lineno="139044">
<summary>
Receive UDP traffic on the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_virtual_places_port" lineno="139063">
<summary>
Do not audit attempts to receive UDP traffic on the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_virtual_places_port" lineno="139082">
<summary>
Send and receive UDP traffic on the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_virtual_places_port" lineno="139099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_virtual_places_port" lineno="139115">
<summary>
Bind TCP sockets to the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_virtual_places_port" lineno="139135">
<summary>
Bind UDP sockets to the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_virtual_places_port" lineno="139155">
<summary>
Do not audit attempts to sbind to virtual_places port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_virtual_places_port" lineno="139174">
<summary>
Make a TCP connection to the virtual_places port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_virtual_places_port" lineno="139191">
<summary>
Do not audit attempts to make a TCP connection to virtual_places port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_virtual_places_client_packets" lineno="139211">
<summary>
Send virtual_places_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_virtual_places_client_packets" lineno="139230">
<summary>
Do not audit attempts to send virtual_places_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_virtual_places_client_packets" lineno="139249">
<summary>
Receive virtual_places_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_virtual_places_client_packets" lineno="139268">
<summary>
Do not audit attempts to receive virtual_places_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_virtual_places_client_packets" lineno="139287">
<summary>
Send and receive virtual_places_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_virtual_places_client_packets" lineno="139303">
<summary>
Do not audit attempts to send and receive virtual_places_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_virtual_places_client_packets" lineno="139318">
<summary>
Relabel packets to virtual_places_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_virtual_places_server_packets" lineno="139338">
<summary>
Send virtual_places_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_virtual_places_server_packets" lineno="139357">
<summary>
Do not audit attempts to send virtual_places_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_virtual_places_server_packets" lineno="139376">
<summary>
Receive virtual_places_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_virtual_places_server_packets" lineno="139395">
<summary>
Do not audit attempts to receive virtual_places_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_virtual_places_server_packets" lineno="139414">
<summary>
Send and receive virtual_places_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_virtual_places_server_packets" lineno="139430">
<summary>
Do not audit attempts to send and receive virtual_places_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_virtual_places_server_packets" lineno="139445">
<summary>
Relabel packets to virtual_places_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_virt_migration_port" lineno="139467">
<summary>
Send and receive TCP traffic on the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_virt_migration_port" lineno="139486">
<summary>
Send UDP traffic on the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_virt_migration_port" lineno="139505">
<summary>
Do not audit attempts to send UDP traffic on the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_virt_migration_port" lineno="139524">
<summary>
Receive UDP traffic on the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_virt_migration_port" lineno="139543">
<summary>
Do not audit attempts to receive UDP traffic on the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_virt_migration_port" lineno="139562">
<summary>
Send and receive UDP traffic on the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_virt_migration_port" lineno="139579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_virt_migration_port" lineno="139595">
<summary>
Bind TCP sockets to the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_virt_migration_port" lineno="139615">
<summary>
Bind UDP sockets to the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_virt_migration_port" lineno="139635">
<summary>
Do not audit attempts to sbind to virt_migration port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_virt_migration_port" lineno="139654">
<summary>
Make a TCP connection to the virt_migration port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_virt_migration_port" lineno="139671">
<summary>
Do not audit attempts to make a TCP connection to virt_migration port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_virt_migration_client_packets" lineno="139691">
<summary>
Send virt_migration_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_virt_migration_client_packets" lineno="139710">
<summary>
Do not audit attempts to send virt_migration_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_virt_migration_client_packets" lineno="139729">
<summary>
Receive virt_migration_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_virt_migration_client_packets" lineno="139748">
<summary>
Do not audit attempts to receive virt_migration_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_virt_migration_client_packets" lineno="139767">
<summary>
Send and receive virt_migration_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_virt_migration_client_packets" lineno="139783">
<summary>
Do not audit attempts to send and receive virt_migration_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_virt_migration_client_packets" lineno="139798">
<summary>
Relabel packets to virt_migration_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_virt_migration_server_packets" lineno="139818">
<summary>
Send virt_migration_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_virt_migration_server_packets" lineno="139837">
<summary>
Do not audit attempts to send virt_migration_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_virt_migration_server_packets" lineno="139856">
<summary>
Receive virt_migration_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_virt_migration_server_packets" lineno="139875">
<summary>
Do not audit attempts to receive virt_migration_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_virt_migration_server_packets" lineno="139894">
<summary>
Send and receive virt_migration_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_virt_migration_server_packets" lineno="139910">
<summary>
Do not audit attempts to send and receive virt_migration_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_virt_migration_server_packets" lineno="139925">
<summary>
Relabel packets to virt_migration_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_vnc_port" lineno="139947">
<summary>
Send and receive TCP traffic on the vnc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_vnc_port" lineno="139966">
<summary>
Send UDP traffic on the vnc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_vnc_port" lineno="139985">
<summary>
Do not audit attempts to send UDP traffic on the vnc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_vnc_port" lineno="140004">
<summary>
Receive UDP traffic on the vnc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_vnc_port" lineno="140023">
<summary>
Do not audit attempts to receive UDP traffic on the vnc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_vnc_port" lineno="140042">
<summary>
Send and receive UDP traffic on the vnc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_vnc_port" lineno="140059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the vnc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_vnc_port" lineno="140075">
<summary>
Bind TCP sockets to the vnc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_vnc_port" lineno="140095">
<summary>
Bind UDP sockets to the vnc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_vnc_port" lineno="140115">
<summary>
Do not audit attempts to sbind to vnc port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_vnc_port" lineno="140134">
<summary>
Make a TCP connection to the vnc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_vnc_port" lineno="140151">
<summary>
Do not audit attempts to make a TCP connection to vnc port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_vnc_client_packets" lineno="140171">
<summary>
Send vnc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_vnc_client_packets" lineno="140190">
<summary>
Do not audit attempts to send vnc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_vnc_client_packets" lineno="140209">
<summary>
Receive vnc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_vnc_client_packets" lineno="140228">
<summary>
Do not audit attempts to receive vnc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_vnc_client_packets" lineno="140247">
<summary>
Send and receive vnc_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_vnc_client_packets" lineno="140263">
<summary>
Do not audit attempts to send and receive vnc_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_vnc_client_packets" lineno="140278">
<summary>
Relabel packets to vnc_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_vnc_server_packets" lineno="140298">
<summary>
Send vnc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_vnc_server_packets" lineno="140317">
<summary>
Do not audit attempts to send vnc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_vnc_server_packets" lineno="140336">
<summary>
Receive vnc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_vnc_server_packets" lineno="140355">
<summary>
Do not audit attempts to receive vnc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_vnc_server_packets" lineno="140374">
<summary>
Send and receive vnc_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_vnc_server_packets" lineno="140390">
<summary>
Do not audit attempts to send and receive vnc_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_vnc_server_packets" lineno="140405">
<summary>
Relabel packets to vnc_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_vqp_port" lineno="140427">
<summary>
Send and receive TCP traffic on the vqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_vqp_port" lineno="140446">
<summary>
Send UDP traffic on the vqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_vqp_port" lineno="140465">
<summary>
Do not audit attempts to send UDP traffic on the vqp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_vqp_port" lineno="140484">
<summary>
Receive UDP traffic on the vqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_vqp_port" lineno="140503">
<summary>
Do not audit attempts to receive UDP traffic on the vqp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_vqp_port" lineno="140522">
<summary>
Send and receive UDP traffic on the vqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_vqp_port" lineno="140539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the vqp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_vqp_port" lineno="140555">
<summary>
Bind TCP sockets to the vqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_vqp_port" lineno="140575">
<summary>
Bind UDP sockets to the vqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_vqp_port" lineno="140595">
<summary>
Do not audit attempts to sbind to vqp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_vqp_port" lineno="140614">
<summary>
Make a TCP connection to the vqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_vqp_port" lineno="140631">
<summary>
Do not audit attempts to make a TCP connection to vqp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_vqp_client_packets" lineno="140651">
<summary>
Send vqp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_vqp_client_packets" lineno="140670">
<summary>
Do not audit attempts to send vqp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_vqp_client_packets" lineno="140689">
<summary>
Receive vqp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_vqp_client_packets" lineno="140708">
<summary>
Do not audit attempts to receive vqp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_vqp_client_packets" lineno="140727">
<summary>
Send and receive vqp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_vqp_client_packets" lineno="140743">
<summary>
Do not audit attempts to send and receive vqp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_vqp_client_packets" lineno="140758">
<summary>
Relabel packets to vqp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_vqp_server_packets" lineno="140778">
<summary>
Send vqp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_vqp_server_packets" lineno="140797">
<summary>
Do not audit attempts to send vqp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_vqp_server_packets" lineno="140816">
<summary>
Receive vqp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_vqp_server_packets" lineno="140835">
<summary>
Do not audit attempts to receive vqp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_vqp_server_packets" lineno="140854">
<summary>
Send and receive vqp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_vqp_server_packets" lineno="140870">
<summary>
Do not audit attempts to send and receive vqp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_vqp_server_packets" lineno="140885">
<summary>
Relabel packets to vqp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_wccp_port" lineno="140907">
<summary>
Send and receive TCP traffic on the wccp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_wccp_port" lineno="140926">
<summary>
Send UDP traffic on the wccp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_wccp_port" lineno="140945">
<summary>
Do not audit attempts to send UDP traffic on the wccp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_wccp_port" lineno="140964">
<summary>
Receive UDP traffic on the wccp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_wccp_port" lineno="140983">
<summary>
Do not audit attempts to receive UDP traffic on the wccp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_wccp_port" lineno="141002">
<summary>
Send and receive UDP traffic on the wccp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_wccp_port" lineno="141019">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wccp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_wccp_port" lineno="141035">
<summary>
Bind TCP sockets to the wccp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_wccp_port" lineno="141055">
<summary>
Bind UDP sockets to the wccp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_wccp_port" lineno="141075">
<summary>
Do not audit attempts to sbind to wccp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_wccp_port" lineno="141094">
<summary>
Make a TCP connection to the wccp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_wccp_port" lineno="141111">
<summary>
Do not audit attempts to make a TCP connection to wccp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_wccp_client_packets" lineno="141131">
<summary>
Send wccp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_wccp_client_packets" lineno="141150">
<summary>
Do not audit attempts to send wccp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_wccp_client_packets" lineno="141169">
<summary>
Receive wccp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_wccp_client_packets" lineno="141188">
<summary>
Do not audit attempts to receive wccp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_wccp_client_packets" lineno="141207">
<summary>
Send and receive wccp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_wccp_client_packets" lineno="141223">
<summary>
Do not audit attempts to send and receive wccp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_wccp_client_packets" lineno="141238">
<summary>
Relabel packets to wccp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_wccp_server_packets" lineno="141258">
<summary>
Send wccp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_wccp_server_packets" lineno="141277">
<summary>
Do not audit attempts to send wccp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_wccp_server_packets" lineno="141296">
<summary>
Receive wccp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_wccp_server_packets" lineno="141315">
<summary>
Do not audit attempts to receive wccp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_wccp_server_packets" lineno="141334">
<summary>
Send and receive wccp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_wccp_server_packets" lineno="141350">
<summary>
Do not audit attempts to send and receive wccp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_wccp_server_packets" lineno="141365">
<summary>
Relabel packets to wccp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_websm_port" lineno="141387">
<summary>
Send and receive TCP traffic on the websm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_websm_port" lineno="141406">
<summary>
Send UDP traffic on the websm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_websm_port" lineno="141425">
<summary>
Do not audit attempts to send UDP traffic on the websm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_websm_port" lineno="141444">
<summary>
Receive UDP traffic on the websm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_websm_port" lineno="141463">
<summary>
Do not audit attempts to receive UDP traffic on the websm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_websm_port" lineno="141482">
<summary>
Send and receive UDP traffic on the websm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_websm_port" lineno="141499">
<summary>
Do not audit attempts to send and receive
UDP traffic on the websm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_websm_port" lineno="141515">
<summary>
Bind TCP sockets to the websm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_websm_port" lineno="141535">
<summary>
Bind UDP sockets to the websm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_websm_port" lineno="141555">
<summary>
Do not audit attempts to sbind to websm port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_websm_port" lineno="141574">
<summary>
Make a TCP connection to the websm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_websm_port" lineno="141591">
<summary>
Do not audit attempts to make a TCP connection to websm port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_websm_client_packets" lineno="141611">
<summary>
Send websm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_websm_client_packets" lineno="141630">
<summary>
Do not audit attempts to send websm_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_websm_client_packets" lineno="141649">
<summary>
Receive websm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_websm_client_packets" lineno="141668">
<summary>
Do not audit attempts to receive websm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_websm_client_packets" lineno="141687">
<summary>
Send and receive websm_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_websm_client_packets" lineno="141703">
<summary>
Do not audit attempts to send and receive websm_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_websm_client_packets" lineno="141718">
<summary>
Relabel packets to websm_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_websm_server_packets" lineno="141738">
<summary>
Send websm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_websm_server_packets" lineno="141757">
<summary>
Do not audit attempts to send websm_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_websm_server_packets" lineno="141776">
<summary>
Receive websm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_websm_server_packets" lineno="141795">
<summary>
Do not audit attempts to receive websm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_websm_server_packets" lineno="141814">
<summary>
Send and receive websm_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_websm_server_packets" lineno="141830">
<summary>
Do not audit attempts to send and receive websm_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_websm_server_packets" lineno="141845">
<summary>
Relabel packets to websm_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_whois_port" lineno="141867">
<summary>
Send and receive TCP traffic on the whois port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_whois_port" lineno="141886">
<summary>
Send UDP traffic on the whois port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_whois_port" lineno="141905">
<summary>
Do not audit attempts to send UDP traffic on the whois port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_whois_port" lineno="141924">
<summary>
Receive UDP traffic on the whois port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_whois_port" lineno="141943">
<summary>
Do not audit attempts to receive UDP traffic on the whois port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_whois_port" lineno="141962">
<summary>
Send and receive UDP traffic on the whois port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_whois_port" lineno="141979">
<summary>
Do not audit attempts to send and receive
UDP traffic on the whois port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_whois_port" lineno="141995">
<summary>
Bind TCP sockets to the whois port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_whois_port" lineno="142015">
<summary>
Bind UDP sockets to the whois port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_whois_port" lineno="142035">
<summary>
Do not audit attempts to sbind to whois port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_whois_port" lineno="142054">
<summary>
Make a TCP connection to the whois port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_whois_port" lineno="142071">
<summary>
Do not audit attempts to make a TCP connection to whois port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_whois_client_packets" lineno="142091">
<summary>
Send whois_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_whois_client_packets" lineno="142110">
<summary>
Do not audit attempts to send whois_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_whois_client_packets" lineno="142129">
<summary>
Receive whois_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_whois_client_packets" lineno="142148">
<summary>
Do not audit attempts to receive whois_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_whois_client_packets" lineno="142167">
<summary>
Send and receive whois_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_whois_client_packets" lineno="142183">
<summary>
Do not audit attempts to send and receive whois_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_whois_client_packets" lineno="142198">
<summary>
Relabel packets to whois_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_whois_server_packets" lineno="142218">
<summary>
Send whois_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_whois_server_packets" lineno="142237">
<summary>
Do not audit attempts to send whois_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_whois_server_packets" lineno="142256">
<summary>
Receive whois_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_whois_server_packets" lineno="142275">
<summary>
Do not audit attempts to receive whois_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_whois_server_packets" lineno="142294">
<summary>
Send and receive whois_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_whois_server_packets" lineno="142310">
<summary>
Do not audit attempts to send and receive whois_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_whois_server_packets" lineno="142325">
<summary>
Relabel packets to whois_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_winshadow_port" lineno="142347">
<summary>
Send and receive TCP traffic on the winshadow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_winshadow_port" lineno="142366">
<summary>
Send UDP traffic on the winshadow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_winshadow_port" lineno="142385">
<summary>
Do not audit attempts to send UDP traffic on the winshadow port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_winshadow_port" lineno="142404">
<summary>
Receive UDP traffic on the winshadow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_winshadow_port" lineno="142423">
<summary>
Do not audit attempts to receive UDP traffic on the winshadow port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_winshadow_port" lineno="142442">
<summary>
Send and receive UDP traffic on the winshadow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_winshadow_port" lineno="142459">
<summary>
Do not audit attempts to send and receive
UDP traffic on the winshadow port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_winshadow_port" lineno="142475">
<summary>
Bind TCP sockets to the winshadow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_winshadow_port" lineno="142495">
<summary>
Bind UDP sockets to the winshadow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_winshadow_port" lineno="142515">
<summary>
Do not audit attempts to sbind to winshadow port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_winshadow_port" lineno="142534">
<summary>
Make a TCP connection to the winshadow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_winshadow_port" lineno="142551">
<summary>
Do not audit attempts to make a TCP connection to winshadow port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_winshadow_client_packets" lineno="142571">
<summary>
Send winshadow_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_winshadow_client_packets" lineno="142590">
<summary>
Do not audit attempts to send winshadow_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_winshadow_client_packets" lineno="142609">
<summary>
Receive winshadow_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_winshadow_client_packets" lineno="142628">
<summary>
Do not audit attempts to receive winshadow_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_winshadow_client_packets" lineno="142647">
<summary>
Send and receive winshadow_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_winshadow_client_packets" lineno="142663">
<summary>
Do not audit attempts to send and receive winshadow_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_winshadow_client_packets" lineno="142678">
<summary>
Relabel packets to winshadow_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_winshadow_server_packets" lineno="142698">
<summary>
Send winshadow_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_winshadow_server_packets" lineno="142717">
<summary>
Do not audit attempts to send winshadow_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_winshadow_server_packets" lineno="142736">
<summary>
Receive winshadow_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_winshadow_server_packets" lineno="142755">
<summary>
Do not audit attempts to receive winshadow_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_winshadow_server_packets" lineno="142774">
<summary>
Send and receive winshadow_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_winshadow_server_packets" lineno="142790">
<summary>
Do not audit attempts to send and receive winshadow_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_winshadow_server_packets" lineno="142805">
<summary>
Relabel packets to winshadow_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_wap_wsp_port" lineno="142827">
<summary>
Send and receive TCP traffic on the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_wap_wsp_port" lineno="142846">
<summary>
Send UDP traffic on the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_wap_wsp_port" lineno="142865">
<summary>
Do not audit attempts to send UDP traffic on the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_wap_wsp_port" lineno="142884">
<summary>
Receive UDP traffic on the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_wap_wsp_port" lineno="142903">
<summary>
Do not audit attempts to receive UDP traffic on the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_wap_wsp_port" lineno="142922">
<summary>
Send and receive UDP traffic on the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_wap_wsp_port" lineno="142939">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_wap_wsp_port" lineno="142955">
<summary>
Bind TCP sockets to the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_wap_wsp_port" lineno="142975">
<summary>
Bind UDP sockets to the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_wap_wsp_port" lineno="142995">
<summary>
Do not audit attempts to sbind to wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_wap_wsp_port" lineno="143014">
<summary>
Make a TCP connection to the wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_wap_wsp_port" lineno="143031">
<summary>
Do not audit attempts to make a TCP connection to wap_wsp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_wap_wsp_client_packets" lineno="143051">
<summary>
Send wap_wsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_wap_wsp_client_packets" lineno="143070">
<summary>
Do not audit attempts to send wap_wsp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_wap_wsp_client_packets" lineno="143089">
<summary>
Receive wap_wsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_wap_wsp_client_packets" lineno="143108">
<summary>
Do not audit attempts to receive wap_wsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_wap_wsp_client_packets" lineno="143127">
<summary>
Send and receive wap_wsp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_wap_wsp_client_packets" lineno="143143">
<summary>
Do not audit attempts to send and receive wap_wsp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_wap_wsp_client_packets" lineno="143158">
<summary>
Relabel packets to wap_wsp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_wap_wsp_server_packets" lineno="143178">
<summary>
Send wap_wsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_wap_wsp_server_packets" lineno="143197">
<summary>
Do not audit attempts to send wap_wsp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_wap_wsp_server_packets" lineno="143216">
<summary>
Receive wap_wsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_wap_wsp_server_packets" lineno="143235">
<summary>
Do not audit attempts to receive wap_wsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_wap_wsp_server_packets" lineno="143254">
<summary>
Send and receive wap_wsp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_wap_wsp_server_packets" lineno="143270">
<summary>
Do not audit attempts to send and receive wap_wsp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_wap_wsp_server_packets" lineno="143285">
<summary>
Relabel packets to wap_wsp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_wsdapi_port" lineno="143307">
<summary>
Send and receive TCP traffic on the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_wsdapi_port" lineno="143326">
<summary>
Send UDP traffic on the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_wsdapi_port" lineno="143345">
<summary>
Do not audit attempts to send UDP traffic on the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_wsdapi_port" lineno="143364">
<summary>
Receive UDP traffic on the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_wsdapi_port" lineno="143383">
<summary>
Do not audit attempts to receive UDP traffic on the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_wsdapi_port" lineno="143402">
<summary>
Send and receive UDP traffic on the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_wsdapi_port" lineno="143419">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_wsdapi_port" lineno="143435">
<summary>
Bind TCP sockets to the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_wsdapi_port" lineno="143455">
<summary>
Bind UDP sockets to the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_wsdapi_port" lineno="143475">
<summary>
Do not audit attempts to sbind to wsdapi port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_wsdapi_port" lineno="143494">
<summary>
Make a TCP connection to the wsdapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_wsdapi_port" lineno="143511">
<summary>
Do not audit attempts to make a TCP connection to wsdapi port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_wsdapi_client_packets" lineno="143531">
<summary>
Send wsdapi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_wsdapi_client_packets" lineno="143550">
<summary>
Do not audit attempts to send wsdapi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_wsdapi_client_packets" lineno="143569">
<summary>
Receive wsdapi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_wsdapi_client_packets" lineno="143588">
<summary>
Do not audit attempts to receive wsdapi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_wsdapi_client_packets" lineno="143607">
<summary>
Send and receive wsdapi_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_wsdapi_client_packets" lineno="143623">
<summary>
Do not audit attempts to send and receive wsdapi_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_wsdapi_client_packets" lineno="143638">
<summary>
Relabel packets to wsdapi_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_wsdapi_server_packets" lineno="143658">
<summary>
Send wsdapi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_wsdapi_server_packets" lineno="143677">
<summary>
Do not audit attempts to send wsdapi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_wsdapi_server_packets" lineno="143696">
<summary>
Receive wsdapi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_wsdapi_server_packets" lineno="143715">
<summary>
Do not audit attempts to receive wsdapi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_wsdapi_server_packets" lineno="143734">
<summary>
Send and receive wsdapi_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_wsdapi_server_packets" lineno="143750">
<summary>
Do not audit attempts to send and receive wsdapi_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_wsdapi_server_packets" lineno="143765">
<summary>
Relabel packets to wsdapi_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_wsicopy_port" lineno="143787">
<summary>
Send and receive TCP traffic on the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_wsicopy_port" lineno="143806">
<summary>
Send UDP traffic on the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_wsicopy_port" lineno="143825">
<summary>
Do not audit attempts to send UDP traffic on the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_wsicopy_port" lineno="143844">
<summary>
Receive UDP traffic on the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_wsicopy_port" lineno="143863">
<summary>
Do not audit attempts to receive UDP traffic on the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_wsicopy_port" lineno="143882">
<summary>
Send and receive UDP traffic on the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_wsicopy_port" lineno="143899">
<summary>
Do not audit attempts to send and receive
UDP traffic on the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_wsicopy_port" lineno="143915">
<summary>
Bind TCP sockets to the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_wsicopy_port" lineno="143935">
<summary>
Bind UDP sockets to the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_wsicopy_port" lineno="143955">
<summary>
Do not audit attempts to sbind to wsicopy port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_wsicopy_port" lineno="143974">
<summary>
Make a TCP connection to the wsicopy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_wsicopy_port" lineno="143991">
<summary>
Do not audit attempts to make a TCP connection to wsicopy port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_wsicopy_client_packets" lineno="144011">
<summary>
Send wsicopy_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_wsicopy_client_packets" lineno="144030">
<summary>
Do not audit attempts to send wsicopy_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_wsicopy_client_packets" lineno="144049">
<summary>
Receive wsicopy_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_wsicopy_client_packets" lineno="144068">
<summary>
Do not audit attempts to receive wsicopy_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_wsicopy_client_packets" lineno="144087">
<summary>
Send and receive wsicopy_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_wsicopy_client_packets" lineno="144103">
<summary>
Do not audit attempts to send and receive wsicopy_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_wsicopy_client_packets" lineno="144118">
<summary>
Relabel packets to wsicopy_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_wsicopy_server_packets" lineno="144138">
<summary>
Send wsicopy_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_wsicopy_server_packets" lineno="144157">
<summary>
Do not audit attempts to send wsicopy_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_wsicopy_server_packets" lineno="144176">
<summary>
Receive wsicopy_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_wsicopy_server_packets" lineno="144195">
<summary>
Do not audit attempts to receive wsicopy_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_wsicopy_server_packets" lineno="144214">
<summary>
Send and receive wsicopy_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_wsicopy_server_packets" lineno="144230">
<summary>
Do not audit attempts to send and receive wsicopy_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_wsicopy_server_packets" lineno="144245">
<summary>
Relabel packets to wsicopy_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_xdmcp_port" lineno="144267">
<summary>
Send and receive TCP traffic on the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_xdmcp_port" lineno="144286">
<summary>
Send UDP traffic on the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_xdmcp_port" lineno="144305">
<summary>
Do not audit attempts to send UDP traffic on the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_xdmcp_port" lineno="144324">
<summary>
Receive UDP traffic on the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_xdmcp_port" lineno="144343">
<summary>
Do not audit attempts to receive UDP traffic on the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_xdmcp_port" lineno="144362">
<summary>
Send and receive UDP traffic on the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_xdmcp_port" lineno="144379">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_xdmcp_port" lineno="144395">
<summary>
Bind TCP sockets to the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_xdmcp_port" lineno="144415">
<summary>
Bind UDP sockets to the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_xdmcp_port" lineno="144435">
<summary>
Do not audit attempts to sbind to xdmcp port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_xdmcp_port" lineno="144454">
<summary>
Make a TCP connection to the xdmcp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_xdmcp_port" lineno="144471">
<summary>
Do not audit attempts to make a TCP connection to xdmcp port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xdmcp_client_packets" lineno="144491">
<summary>
Send xdmcp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xdmcp_client_packets" lineno="144510">
<summary>
Do not audit attempts to send xdmcp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xdmcp_client_packets" lineno="144529">
<summary>
Receive xdmcp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xdmcp_client_packets" lineno="144548">
<summary>
Do not audit attempts to receive xdmcp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xdmcp_client_packets" lineno="144567">
<summary>
Send and receive xdmcp_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xdmcp_client_packets" lineno="144583">
<summary>
Do not audit attempts to send and receive xdmcp_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xdmcp_client_packets" lineno="144598">
<summary>
Relabel packets to xdmcp_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xdmcp_server_packets" lineno="144618">
<summary>
Send xdmcp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xdmcp_server_packets" lineno="144637">
<summary>
Do not audit attempts to send xdmcp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xdmcp_server_packets" lineno="144656">
<summary>
Receive xdmcp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xdmcp_server_packets" lineno="144675">
<summary>
Do not audit attempts to receive xdmcp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xdmcp_server_packets" lineno="144694">
<summary>
Send and receive xdmcp_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xdmcp_server_packets" lineno="144710">
<summary>
Do not audit attempts to send and receive xdmcp_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xdmcp_server_packets" lineno="144725">
<summary>
Relabel packets to xdmcp_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_xen_port" lineno="144747">
<summary>
Send and receive TCP traffic on the xen port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_xen_port" lineno="144766">
<summary>
Send UDP traffic on the xen port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_xen_port" lineno="144785">
<summary>
Do not audit attempts to send UDP traffic on the xen port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_xen_port" lineno="144804">
<summary>
Receive UDP traffic on the xen port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_xen_port" lineno="144823">
<summary>
Do not audit attempts to receive UDP traffic on the xen port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_xen_port" lineno="144842">
<summary>
Send and receive UDP traffic on the xen port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_xen_port" lineno="144859">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xen port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_xen_port" lineno="144875">
<summary>
Bind TCP sockets to the xen port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_xen_port" lineno="144895">
<summary>
Bind UDP sockets to the xen port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_xen_port" lineno="144915">
<summary>
Do not audit attempts to sbind to xen port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_xen_port" lineno="144934">
<summary>
Make a TCP connection to the xen port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_xen_port" lineno="144951">
<summary>
Do not audit attempts to make a TCP connection to xen port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xen_client_packets" lineno="144971">
<summary>
Send xen_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xen_client_packets" lineno="144990">
<summary>
Do not audit attempts to send xen_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xen_client_packets" lineno="145009">
<summary>
Receive xen_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xen_client_packets" lineno="145028">
<summary>
Do not audit attempts to receive xen_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xen_client_packets" lineno="145047">
<summary>
Send and receive xen_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xen_client_packets" lineno="145063">
<summary>
Do not audit attempts to send and receive xen_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xen_client_packets" lineno="145078">
<summary>
Relabel packets to xen_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xen_server_packets" lineno="145098">
<summary>
Send xen_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xen_server_packets" lineno="145117">
<summary>
Do not audit attempts to send xen_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xen_server_packets" lineno="145136">
<summary>
Receive xen_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xen_server_packets" lineno="145155">
<summary>
Do not audit attempts to receive xen_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xen_server_packets" lineno="145174">
<summary>
Send and receive xen_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xen_server_packets" lineno="145190">
<summary>
Do not audit attempts to send and receive xen_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xen_server_packets" lineno="145205">
<summary>
Relabel packets to xen_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_xinuexpansion3_port" lineno="145227">
<summary>
Send and receive TCP traffic on the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_xinuexpansion3_port" lineno="145246">
<summary>
Send UDP traffic on the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_xinuexpansion3_port" lineno="145265">
<summary>
Do not audit attempts to send UDP traffic on the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_xinuexpansion3_port" lineno="145284">
<summary>
Receive UDP traffic on the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_xinuexpansion3_port" lineno="145303">
<summary>
Do not audit attempts to receive UDP traffic on the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_xinuexpansion3_port" lineno="145322">
<summary>
Send and receive UDP traffic on the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_xinuexpansion3_port" lineno="145339">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_xinuexpansion3_port" lineno="145355">
<summary>
Bind TCP sockets to the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_xinuexpansion3_port" lineno="145375">
<summary>
Bind UDP sockets to the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_xinuexpansion3_port" lineno="145395">
<summary>
Do not audit attempts to sbind to xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_xinuexpansion3_port" lineno="145414">
<summary>
Make a TCP connection to the xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_xinuexpansion3_port" lineno="145431">
<summary>
Do not audit attempts to make a TCP connection to xinuexpansion3 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xinuexpansion3_client_packets" lineno="145451">
<summary>
Send xinuexpansion3_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xinuexpansion3_client_packets" lineno="145470">
<summary>
Do not audit attempts to send xinuexpansion3_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xinuexpansion3_client_packets" lineno="145489">
<summary>
Receive xinuexpansion3_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xinuexpansion3_client_packets" lineno="145508">
<summary>
Do not audit attempts to receive xinuexpansion3_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xinuexpansion3_client_packets" lineno="145527">
<summary>
Send and receive xinuexpansion3_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xinuexpansion3_client_packets" lineno="145543">
<summary>
Do not audit attempts to send and receive xinuexpansion3_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xinuexpansion3_client_packets" lineno="145558">
<summary>
Relabel packets to xinuexpansion3_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xinuexpansion3_server_packets" lineno="145578">
<summary>
Send xinuexpansion3_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xinuexpansion3_server_packets" lineno="145597">
<summary>
Do not audit attempts to send xinuexpansion3_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xinuexpansion3_server_packets" lineno="145616">
<summary>
Receive xinuexpansion3_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xinuexpansion3_server_packets" lineno="145635">
<summary>
Do not audit attempts to receive xinuexpansion3_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xinuexpansion3_server_packets" lineno="145654">
<summary>
Send and receive xinuexpansion3_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xinuexpansion3_server_packets" lineno="145670">
<summary>
Do not audit attempts to send and receive xinuexpansion3_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xinuexpansion3_server_packets" lineno="145685">
<summary>
Relabel packets to xinuexpansion3_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_xinuexpansion4_port" lineno="145707">
<summary>
Send and receive TCP traffic on the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_xinuexpansion4_port" lineno="145726">
<summary>
Send UDP traffic on the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_xinuexpansion4_port" lineno="145745">
<summary>
Do not audit attempts to send UDP traffic on the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_xinuexpansion4_port" lineno="145764">
<summary>
Receive UDP traffic on the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_xinuexpansion4_port" lineno="145783">
<summary>
Do not audit attempts to receive UDP traffic on the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_xinuexpansion4_port" lineno="145802">
<summary>
Send and receive UDP traffic on the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_xinuexpansion4_port" lineno="145819">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_xinuexpansion4_port" lineno="145835">
<summary>
Bind TCP sockets to the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_xinuexpansion4_port" lineno="145855">
<summary>
Bind UDP sockets to the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_xinuexpansion4_port" lineno="145875">
<summary>
Do not audit attempts to sbind to xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_xinuexpansion4_port" lineno="145894">
<summary>
Make a TCP connection to the xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_xinuexpansion4_port" lineno="145911">
<summary>
Do not audit attempts to make a TCP connection to xinuexpansion4 port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xinuexpansion4_client_packets" lineno="145931">
<summary>
Send xinuexpansion4_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xinuexpansion4_client_packets" lineno="145950">
<summary>
Do not audit attempts to send xinuexpansion4_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xinuexpansion4_client_packets" lineno="145969">
<summary>
Receive xinuexpansion4_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xinuexpansion4_client_packets" lineno="145988">
<summary>
Do not audit attempts to receive xinuexpansion4_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xinuexpansion4_client_packets" lineno="146007">
<summary>
Send and receive xinuexpansion4_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xinuexpansion4_client_packets" lineno="146023">
<summary>
Do not audit attempts to send and receive xinuexpansion4_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xinuexpansion4_client_packets" lineno="146038">
<summary>
Relabel packets to xinuexpansion4_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xinuexpansion4_server_packets" lineno="146058">
<summary>
Send xinuexpansion4_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xinuexpansion4_server_packets" lineno="146077">
<summary>
Do not audit attempts to send xinuexpansion4_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xinuexpansion4_server_packets" lineno="146096">
<summary>
Receive xinuexpansion4_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xinuexpansion4_server_packets" lineno="146115">
<summary>
Do not audit attempts to receive xinuexpansion4_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xinuexpansion4_server_packets" lineno="146134">
<summary>
Send and receive xinuexpansion4_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xinuexpansion4_server_packets" lineno="146150">
<summary>
Do not audit attempts to send and receive xinuexpansion4_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xinuexpansion4_server_packets" lineno="146165">
<summary>
Relabel packets to xinuexpansion4_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_xfs_port" lineno="146187">
<summary>
Send and receive TCP traffic on the xfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_xfs_port" lineno="146206">
<summary>
Send UDP traffic on the xfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_xfs_port" lineno="146225">
<summary>
Do not audit attempts to send UDP traffic on the xfs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_xfs_port" lineno="146244">
<summary>
Receive UDP traffic on the xfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_xfs_port" lineno="146263">
<summary>
Do not audit attempts to receive UDP traffic on the xfs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_xfs_port" lineno="146282">
<summary>
Send and receive UDP traffic on the xfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_xfs_port" lineno="146299">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xfs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_xfs_port" lineno="146315">
<summary>
Bind TCP sockets to the xfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_xfs_port" lineno="146335">
<summary>
Bind UDP sockets to the xfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_xfs_port" lineno="146355">
<summary>
Do not audit attempts to sbind to xfs port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_xfs_port" lineno="146374">
<summary>
Make a TCP connection to the xfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_xfs_port" lineno="146391">
<summary>
Do not audit attempts to make a TCP connection to xfs port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xfs_client_packets" lineno="146411">
<summary>
Send xfs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xfs_client_packets" lineno="146430">
<summary>
Do not audit attempts to send xfs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xfs_client_packets" lineno="146449">
<summary>
Receive xfs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xfs_client_packets" lineno="146468">
<summary>
Do not audit attempts to receive xfs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xfs_client_packets" lineno="146487">
<summary>
Send and receive xfs_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xfs_client_packets" lineno="146503">
<summary>
Do not audit attempts to send and receive xfs_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xfs_client_packets" lineno="146518">
<summary>
Relabel packets to xfs_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xfs_server_packets" lineno="146538">
<summary>
Send xfs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xfs_server_packets" lineno="146557">
<summary>
Do not audit attempts to send xfs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xfs_server_packets" lineno="146576">
<summary>
Receive xfs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xfs_server_packets" lineno="146595">
<summary>
Do not audit attempts to receive xfs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xfs_server_packets" lineno="146614">
<summary>
Send and receive xfs_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xfs_server_packets" lineno="146630">
<summary>
Do not audit attempts to send and receive xfs_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xfs_server_packets" lineno="146645">
<summary>
Relabel packets to xfs_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_xmsg_port" lineno="146667">
<summary>
Send and receive TCP traffic on the xmsg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_xmsg_port" lineno="146686">
<summary>
Send UDP traffic on the xmsg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_xmsg_port" lineno="146705">
<summary>
Do not audit attempts to send UDP traffic on the xmsg port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_xmsg_port" lineno="146724">
<summary>
Receive UDP traffic on the xmsg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_xmsg_port" lineno="146743">
<summary>
Do not audit attempts to receive UDP traffic on the xmsg port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_xmsg_port" lineno="146762">
<summary>
Send and receive UDP traffic on the xmsg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_xmsg_port" lineno="146779">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xmsg port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_xmsg_port" lineno="146795">
<summary>
Bind TCP sockets to the xmsg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_xmsg_port" lineno="146815">
<summary>
Bind UDP sockets to the xmsg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_xmsg_port" lineno="146835">
<summary>
Do not audit attempts to sbind to xmsg port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_xmsg_port" lineno="146854">
<summary>
Make a TCP connection to the xmsg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_xmsg_port" lineno="146871">
<summary>
Do not audit attempts to make a TCP connection to xmsg port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xmsg_client_packets" lineno="146891">
<summary>
Send xmsg_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xmsg_client_packets" lineno="146910">
<summary>
Do not audit attempts to send xmsg_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xmsg_client_packets" lineno="146929">
<summary>
Receive xmsg_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xmsg_client_packets" lineno="146948">
<summary>
Do not audit attempts to receive xmsg_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xmsg_client_packets" lineno="146967">
<summary>
Send and receive xmsg_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xmsg_client_packets" lineno="146983">
<summary>
Do not audit attempts to send and receive xmsg_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xmsg_client_packets" lineno="146998">
<summary>
Relabel packets to xmsg_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xmsg_server_packets" lineno="147018">
<summary>
Send xmsg_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xmsg_server_packets" lineno="147037">
<summary>
Do not audit attempts to send xmsg_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xmsg_server_packets" lineno="147056">
<summary>
Receive xmsg_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xmsg_server_packets" lineno="147075">
<summary>
Do not audit attempts to receive xmsg_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xmsg_server_packets" lineno="147094">
<summary>
Send and receive xmsg_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xmsg_server_packets" lineno="147110">
<summary>
Do not audit attempts to send and receive xmsg_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xmsg_server_packets" lineno="147125">
<summary>
Relabel packets to xmsg_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_xodbc_connect_port" lineno="147147">
<summary>
Send and receive TCP traffic on the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_xodbc_connect_port" lineno="147166">
<summary>
Send UDP traffic on the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_xodbc_connect_port" lineno="147185">
<summary>
Do not audit attempts to send UDP traffic on the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_xodbc_connect_port" lineno="147204">
<summary>
Receive UDP traffic on the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_xodbc_connect_port" lineno="147223">
<summary>
Do not audit attempts to receive UDP traffic on the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_xodbc_connect_port" lineno="147242">
<summary>
Send and receive UDP traffic on the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_xodbc_connect_port" lineno="147259">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_xodbc_connect_port" lineno="147275">
<summary>
Bind TCP sockets to the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_xodbc_connect_port" lineno="147295">
<summary>
Bind UDP sockets to the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_xodbc_connect_port" lineno="147315">
<summary>
Do not audit attempts to sbind to xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_xodbc_connect_port" lineno="147334">
<summary>
Make a TCP connection to the xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_xodbc_connect_port" lineno="147351">
<summary>
Do not audit attempts to make a TCP connection to xodbc_connect port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xodbc_connect_client_packets" lineno="147371">
<summary>
Send xodbc_connect_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xodbc_connect_client_packets" lineno="147390">
<summary>
Do not audit attempts to send xodbc_connect_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xodbc_connect_client_packets" lineno="147409">
<summary>
Receive xodbc_connect_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xodbc_connect_client_packets" lineno="147428">
<summary>
Do not audit attempts to receive xodbc_connect_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xodbc_connect_client_packets" lineno="147447">
<summary>
Send and receive xodbc_connect_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xodbc_connect_client_packets" lineno="147463">
<summary>
Do not audit attempts to send and receive xodbc_connect_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xodbc_connect_client_packets" lineno="147478">
<summary>
Relabel packets to xodbc_connect_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xodbc_connect_server_packets" lineno="147498">
<summary>
Send xodbc_connect_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xodbc_connect_server_packets" lineno="147517">
<summary>
Do not audit attempts to send xodbc_connect_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xodbc_connect_server_packets" lineno="147536">
<summary>
Receive xodbc_connect_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xodbc_connect_server_packets" lineno="147555">
<summary>
Do not audit attempts to receive xodbc_connect_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xodbc_connect_server_packets" lineno="147574">
<summary>
Send and receive xodbc_connect_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xodbc_connect_server_packets" lineno="147590">
<summary>
Do not audit attempts to send and receive xodbc_connect_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xodbc_connect_server_packets" lineno="147605">
<summary>
Relabel packets to xodbc_connect_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_xserver_port" lineno="147627">
<summary>
Send and receive TCP traffic on the xserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_xserver_port" lineno="147646">
<summary>
Send UDP traffic on the xserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_xserver_port" lineno="147665">
<summary>
Do not audit attempts to send UDP traffic on the xserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_xserver_port" lineno="147684">
<summary>
Receive UDP traffic on the xserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_xserver_port" lineno="147703">
<summary>
Do not audit attempts to receive UDP traffic on the xserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_xserver_port" lineno="147722">
<summary>
Send and receive UDP traffic on the xserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_xserver_port" lineno="147739">
<summary>
Do not audit attempts to send and receive
UDP traffic on the xserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_xserver_port" lineno="147755">
<summary>
Bind TCP sockets to the xserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_xserver_port" lineno="147775">
<summary>
Bind UDP sockets to the xserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_xserver_port" lineno="147795">
<summary>
Do not audit attempts to sbind to xserver port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_xserver_port" lineno="147814">
<summary>
Make a TCP connection to the xserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_xserver_port" lineno="147831">
<summary>
Do not audit attempts to make a TCP connection to xserver port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xserver_client_packets" lineno="147851">
<summary>
Send xserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xserver_client_packets" lineno="147870">
<summary>
Do not audit attempts to send xserver_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xserver_client_packets" lineno="147889">
<summary>
Receive xserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xserver_client_packets" lineno="147908">
<summary>
Do not audit attempts to receive xserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xserver_client_packets" lineno="147927">
<summary>
Send and receive xserver_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xserver_client_packets" lineno="147943">
<summary>
Do not audit attempts to send and receive xserver_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xserver_client_packets" lineno="147958">
<summary>
Relabel packets to xserver_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_xserver_server_packets" lineno="147978">
<summary>
Send xserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_xserver_server_packets" lineno="147997">
<summary>
Do not audit attempts to send xserver_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_xserver_server_packets" lineno="148016">
<summary>
Receive xserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_xserver_server_packets" lineno="148035">
<summary>
Do not audit attempts to receive xserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_xserver_server_packets" lineno="148054">
<summary>
Send and receive xserver_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_xserver_server_packets" lineno="148070">
<summary>
Do not audit attempts to send and receive xserver_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_xserver_server_packets" lineno="148085">
<summary>
Relabel packets to xserver_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_qpasa_agent_port" lineno="148107">
<summary>
Send and receive TCP traffic on the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_qpasa_agent_port" lineno="148126">
<summary>
Send UDP traffic on the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_qpasa_agent_port" lineno="148145">
<summary>
Do not audit attempts to send UDP traffic on the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_qpasa_agent_port" lineno="148164">
<summary>
Receive UDP traffic on the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_qpasa_agent_port" lineno="148183">
<summary>
Do not audit attempts to receive UDP traffic on the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_qpasa_agent_port" lineno="148202">
<summary>
Send and receive UDP traffic on the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_qpasa_agent_port" lineno="148219">
<summary>
Do not audit attempts to send and receive
UDP traffic on the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_qpasa_agent_port" lineno="148235">
<summary>
Bind TCP sockets to the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_qpasa_agent_port" lineno="148255">
<summary>
Bind UDP sockets to the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_qpasa_agent_port" lineno="148275">
<summary>
Do not audit attempts to sbind to qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_qpasa_agent_port" lineno="148294">
<summary>
Make a TCP connection to the qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_qpasa_agent_port" lineno="148311">
<summary>
Do not audit attempts to make a TCP connection to qpasa_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_qpasa_agent_client_packets" lineno="148331">
<summary>
Send qpasa_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_qpasa_agent_client_packets" lineno="148350">
<summary>
Do not audit attempts to send qpasa_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_qpasa_agent_client_packets" lineno="148369">
<summary>
Receive qpasa_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_qpasa_agent_client_packets" lineno="148388">
<summary>
Do not audit attempts to receive qpasa_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_qpasa_agent_client_packets" lineno="148407">
<summary>
Send and receive qpasa_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_qpasa_agent_client_packets" lineno="148423">
<summary>
Do not audit attempts to send and receive qpasa_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_qpasa_agent_client_packets" lineno="148438">
<summary>
Relabel packets to qpasa_agent_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_qpasa_agent_server_packets" lineno="148458">
<summary>
Send qpasa_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_qpasa_agent_server_packets" lineno="148477">
<summary>
Do not audit attempts to send qpasa_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_qpasa_agent_server_packets" lineno="148496">
<summary>
Receive qpasa_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_qpasa_agent_server_packets" lineno="148515">
<summary>
Do not audit attempts to receive qpasa_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_qpasa_agent_server_packets" lineno="148534">
<summary>
Send and receive qpasa_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_qpasa_agent_server_packets" lineno="148550">
<summary>
Do not audit attempts to send and receive qpasa_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_qpasa_agent_server_packets" lineno="148565">
<summary>
Relabel packets to qpasa_agent_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_zarafa_port" lineno="148587">
<summary>
Send and receive TCP traffic on the zarafa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_zarafa_port" lineno="148606">
<summary>
Send UDP traffic on the zarafa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_zarafa_port" lineno="148625">
<summary>
Do not audit attempts to send UDP traffic on the zarafa port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_zarafa_port" lineno="148644">
<summary>
Receive UDP traffic on the zarafa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_zarafa_port" lineno="148663">
<summary>
Do not audit attempts to receive UDP traffic on the zarafa port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_zarafa_port" lineno="148682">
<summary>
Send and receive UDP traffic on the zarafa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_zarafa_port" lineno="148699">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zarafa port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_zarafa_port" lineno="148715">
<summary>
Bind TCP sockets to the zarafa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_zarafa_port" lineno="148735">
<summary>
Bind UDP sockets to the zarafa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_zarafa_port" lineno="148755">
<summary>
Do not audit attempts to sbind to zarafa port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_zarafa_port" lineno="148774">
<summary>
Make a TCP connection to the zarafa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_zarafa_port" lineno="148791">
<summary>
Do not audit attempts to make a TCP connection to zarafa port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zarafa_client_packets" lineno="148811">
<summary>
Send zarafa_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zarafa_client_packets" lineno="148830">
<summary>
Do not audit attempts to send zarafa_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zarafa_client_packets" lineno="148849">
<summary>
Receive zarafa_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zarafa_client_packets" lineno="148868">
<summary>
Do not audit attempts to receive zarafa_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zarafa_client_packets" lineno="148887">
<summary>
Send and receive zarafa_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zarafa_client_packets" lineno="148903">
<summary>
Do not audit attempts to send and receive zarafa_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zarafa_client_packets" lineno="148918">
<summary>
Relabel packets to zarafa_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zarafa_server_packets" lineno="148938">
<summary>
Send zarafa_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zarafa_server_packets" lineno="148957">
<summary>
Do not audit attempts to send zarafa_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zarafa_server_packets" lineno="148976">
<summary>
Receive zarafa_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zarafa_server_packets" lineno="148995">
<summary>
Do not audit attempts to receive zarafa_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zarafa_server_packets" lineno="149014">
<summary>
Send and receive zarafa_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zarafa_server_packets" lineno="149030">
<summary>
Do not audit attempts to send and receive zarafa_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zarafa_server_packets" lineno="149045">
<summary>
Relabel packets to zarafa_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_zabbix_port" lineno="149067">
<summary>
Send and receive TCP traffic on the zabbix port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_zabbix_port" lineno="149086">
<summary>
Send UDP traffic on the zabbix port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_zabbix_port" lineno="149105">
<summary>
Do not audit attempts to send UDP traffic on the zabbix port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_zabbix_port" lineno="149124">
<summary>
Receive UDP traffic on the zabbix port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_zabbix_port" lineno="149143">
<summary>
Do not audit attempts to receive UDP traffic on the zabbix port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_zabbix_port" lineno="149162">
<summary>
Send and receive UDP traffic on the zabbix port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_zabbix_port" lineno="149179">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zabbix port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_zabbix_port" lineno="149195">
<summary>
Bind TCP sockets to the zabbix port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_zabbix_port" lineno="149215">
<summary>
Bind UDP sockets to the zabbix port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_zabbix_port" lineno="149235">
<summary>
Do not audit attempts to sbind to zabbix port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_zabbix_port" lineno="149254">
<summary>
Make a TCP connection to the zabbix port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_zabbix_port" lineno="149271">
<summary>
Do not audit attempts to make a TCP connection to zabbix port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zabbix_client_packets" lineno="149291">
<summary>
Send zabbix_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zabbix_client_packets" lineno="149310">
<summary>
Do not audit attempts to send zabbix_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zabbix_client_packets" lineno="149329">
<summary>
Receive zabbix_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zabbix_client_packets" lineno="149348">
<summary>
Do not audit attempts to receive zabbix_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zabbix_client_packets" lineno="149367">
<summary>
Send and receive zabbix_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zabbix_client_packets" lineno="149383">
<summary>
Do not audit attempts to send and receive zabbix_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zabbix_client_packets" lineno="149398">
<summary>
Relabel packets to zabbix_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zabbix_server_packets" lineno="149418">
<summary>
Send zabbix_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zabbix_server_packets" lineno="149437">
<summary>
Do not audit attempts to send zabbix_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zabbix_server_packets" lineno="149456">
<summary>
Receive zabbix_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zabbix_server_packets" lineno="149475">
<summary>
Do not audit attempts to receive zabbix_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zabbix_server_packets" lineno="149494">
<summary>
Send and receive zabbix_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zabbix_server_packets" lineno="149510">
<summary>
Do not audit attempts to send and receive zabbix_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zabbix_server_packets" lineno="149525">
<summary>
Relabel packets to zabbix_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_zabbix_agent_port" lineno="149547">
<summary>
Send and receive TCP traffic on the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_zabbix_agent_port" lineno="149566">
<summary>
Send UDP traffic on the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_zabbix_agent_port" lineno="149585">
<summary>
Do not audit attempts to send UDP traffic on the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_zabbix_agent_port" lineno="149604">
<summary>
Receive UDP traffic on the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_zabbix_agent_port" lineno="149623">
<summary>
Do not audit attempts to receive UDP traffic on the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_zabbix_agent_port" lineno="149642">
<summary>
Send and receive UDP traffic on the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_zabbix_agent_port" lineno="149659">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_zabbix_agent_port" lineno="149675">
<summary>
Bind TCP sockets to the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_zabbix_agent_port" lineno="149695">
<summary>
Bind UDP sockets to the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_zabbix_agent_port" lineno="149715">
<summary>
Do not audit attempts to sbind to zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_zabbix_agent_port" lineno="149734">
<summary>
Make a TCP connection to the zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_zabbix_agent_port" lineno="149751">
<summary>
Do not audit attempts to make a TCP connection to zabbix_agent port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zabbix_agent_client_packets" lineno="149771">
<summary>
Send zabbix_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zabbix_agent_client_packets" lineno="149790">
<summary>
Do not audit attempts to send zabbix_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zabbix_agent_client_packets" lineno="149809">
<summary>
Receive zabbix_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zabbix_agent_client_packets" lineno="149828">
<summary>
Do not audit attempts to receive zabbix_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zabbix_agent_client_packets" lineno="149847">
<summary>
Send and receive zabbix_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zabbix_agent_client_packets" lineno="149863">
<summary>
Do not audit attempts to send and receive zabbix_agent_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zabbix_agent_client_packets" lineno="149878">
<summary>
Relabel packets to zabbix_agent_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zabbix_agent_server_packets" lineno="149898">
<summary>
Send zabbix_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zabbix_agent_server_packets" lineno="149917">
<summary>
Do not audit attempts to send zabbix_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zabbix_agent_server_packets" lineno="149936">
<summary>
Receive zabbix_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zabbix_agent_server_packets" lineno="149955">
<summary>
Do not audit attempts to receive zabbix_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zabbix_agent_server_packets" lineno="149974">
<summary>
Send and receive zabbix_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zabbix_agent_server_packets" lineno="149990">
<summary>
Do not audit attempts to send and receive zabbix_agent_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zabbix_agent_server_packets" lineno="150005">
<summary>
Relabel packets to zabbix_agent_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_zookeeper_client_port" lineno="150027">
<summary>
Send and receive TCP traffic on the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_zookeeper_client_port" lineno="150046">
<summary>
Send UDP traffic on the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_zookeeper_client_port" lineno="150065">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_zookeeper_client_port" lineno="150084">
<summary>
Receive UDP traffic on the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_zookeeper_client_port" lineno="150103">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_zookeeper_client_port" lineno="150122">
<summary>
Send and receive UDP traffic on the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_client_port" lineno="150139">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_zookeeper_client_port" lineno="150155">
<summary>
Bind TCP sockets to the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_zookeeper_client_port" lineno="150175">
<summary>
Bind UDP sockets to the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_zookeeper_client_port" lineno="150195">
<summary>
Do not audit attempts to sbind to zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_zookeeper_client_port" lineno="150214">
<summary>
Make a TCP connection to the zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_zookeeper_client_port" lineno="150231">
<summary>
Do not audit attempts to make a TCP connection to zookeeper_client port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zookeeper_client_client_packets" lineno="150251">
<summary>
Send zookeeper_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zookeeper_client_client_packets" lineno="150270">
<summary>
Do not audit attempts to send zookeeper_client_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zookeeper_client_client_packets" lineno="150289">
<summary>
Receive zookeeper_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zookeeper_client_client_packets" lineno="150308">
<summary>
Do not audit attempts to receive zookeeper_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zookeeper_client_client_packets" lineno="150327">
<summary>
Send and receive zookeeper_client_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zookeeper_client_client_packets" lineno="150343">
<summary>
Do not audit attempts to send and receive zookeeper_client_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zookeeper_client_client_packets" lineno="150358">
<summary>
Relabel packets to zookeeper_client_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zookeeper_client_server_packets" lineno="150378">
<summary>
Send zookeeper_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zookeeper_client_server_packets" lineno="150397">
<summary>
Do not audit attempts to send zookeeper_client_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zookeeper_client_server_packets" lineno="150416">
<summary>
Receive zookeeper_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zookeeper_client_server_packets" lineno="150435">
<summary>
Do not audit attempts to receive zookeeper_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zookeeper_client_server_packets" lineno="150454">
<summary>
Send and receive zookeeper_client_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zookeeper_client_server_packets" lineno="150470">
<summary>
Do not audit attempts to send and receive zookeeper_client_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zookeeper_client_server_packets" lineno="150485">
<summary>
Relabel packets to zookeeper_client_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_zookeeper_election_port" lineno="150507">
<summary>
Send and receive TCP traffic on the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_zookeeper_election_port" lineno="150526">
<summary>
Send UDP traffic on the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_zookeeper_election_port" lineno="150545">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_zookeeper_election_port" lineno="150564">
<summary>
Receive UDP traffic on the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_zookeeper_election_port" lineno="150583">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_zookeeper_election_port" lineno="150602">
<summary>
Send and receive UDP traffic on the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_election_port" lineno="150619">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_zookeeper_election_port" lineno="150635">
<summary>
Bind TCP sockets to the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_zookeeper_election_port" lineno="150655">
<summary>
Bind UDP sockets to the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_zookeeper_election_port" lineno="150675">
<summary>
Do not audit attempts to sbind to zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_zookeeper_election_port" lineno="150694">
<summary>
Make a TCP connection to the zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_zookeeper_election_port" lineno="150711">
<summary>
Do not audit attempts to make a TCP connection to zookeeper_election port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zookeeper_election_client_packets" lineno="150731">
<summary>
Send zookeeper_election_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zookeeper_election_client_packets" lineno="150750">
<summary>
Do not audit attempts to send zookeeper_election_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zookeeper_election_client_packets" lineno="150769">
<summary>
Receive zookeeper_election_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zookeeper_election_client_packets" lineno="150788">
<summary>
Do not audit attempts to receive zookeeper_election_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zookeeper_election_client_packets" lineno="150807">
<summary>
Send and receive zookeeper_election_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zookeeper_election_client_packets" lineno="150823">
<summary>
Do not audit attempts to send and receive zookeeper_election_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zookeeper_election_client_packets" lineno="150838">
<summary>
Relabel packets to zookeeper_election_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zookeeper_election_server_packets" lineno="150858">
<summary>
Send zookeeper_election_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zookeeper_election_server_packets" lineno="150877">
<summary>
Do not audit attempts to send zookeeper_election_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zookeeper_election_server_packets" lineno="150896">
<summary>
Receive zookeeper_election_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zookeeper_election_server_packets" lineno="150915">
<summary>
Do not audit attempts to receive zookeeper_election_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zookeeper_election_server_packets" lineno="150934">
<summary>
Send and receive zookeeper_election_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zookeeper_election_server_packets" lineno="150950">
<summary>
Do not audit attempts to send and receive zookeeper_election_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zookeeper_election_server_packets" lineno="150965">
<summary>
Relabel packets to zookeeper_election_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_zookeeper_leader_port" lineno="150987">
<summary>
Send and receive TCP traffic on the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_zookeeper_leader_port" lineno="151006">
<summary>
Send UDP traffic on the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_zookeeper_leader_port" lineno="151025">
<summary>
Do not audit attempts to send UDP traffic on the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_zookeeper_leader_port" lineno="151044">
<summary>
Receive UDP traffic on the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_zookeeper_leader_port" lineno="151063">
<summary>
Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_zookeeper_leader_port" lineno="151082">
<summary>
Send and receive UDP traffic on the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_zookeeper_leader_port" lineno="151099">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_zookeeper_leader_port" lineno="151115">
<summary>
Bind TCP sockets to the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_zookeeper_leader_port" lineno="151135">
<summary>
Bind UDP sockets to the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_zookeeper_leader_port" lineno="151155">
<summary>
Do not audit attempts to sbind to zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_zookeeper_leader_port" lineno="151174">
<summary>
Make a TCP connection to the zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_zookeeper_leader_port" lineno="151191">
<summary>
Do not audit attempts to make a TCP connection to zookeeper_leader port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zookeeper_leader_client_packets" lineno="151211">
<summary>
Send zookeeper_leader_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zookeeper_leader_client_packets" lineno="151230">
<summary>
Do not audit attempts to send zookeeper_leader_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zookeeper_leader_client_packets" lineno="151249">
<summary>
Receive zookeeper_leader_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zookeeper_leader_client_packets" lineno="151268">
<summary>
Do not audit attempts to receive zookeeper_leader_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zookeeper_leader_client_packets" lineno="151287">
<summary>
Send and receive zookeeper_leader_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_client_packets" lineno="151303">
<summary>
Do not audit attempts to send and receive zookeeper_leader_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zookeeper_leader_client_packets" lineno="151318">
<summary>
Relabel packets to zookeeper_leader_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zookeeper_leader_server_packets" lineno="151338">
<summary>
Send zookeeper_leader_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zookeeper_leader_server_packets" lineno="151357">
<summary>
Do not audit attempts to send zookeeper_leader_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zookeeper_leader_server_packets" lineno="151376">
<summary>
Receive zookeeper_leader_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zookeeper_leader_server_packets" lineno="151395">
<summary>
Do not audit attempts to receive zookeeper_leader_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zookeeper_leader_server_packets" lineno="151414">
<summary>
Send and receive zookeeper_leader_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zookeeper_leader_server_packets" lineno="151430">
<summary>
Do not audit attempts to send and receive zookeeper_leader_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zookeeper_leader_server_packets" lineno="151445">
<summary>
Relabel packets to zookeeper_leader_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_zebra_port" lineno="151467">
<summary>
Send and receive TCP traffic on the zebra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_zebra_port" lineno="151486">
<summary>
Send UDP traffic on the zebra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_zebra_port" lineno="151505">
<summary>
Do not audit attempts to send UDP traffic on the zebra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_zebra_port" lineno="151524">
<summary>
Receive UDP traffic on the zebra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_zebra_port" lineno="151543">
<summary>
Do not audit attempts to receive UDP traffic on the zebra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_zebra_port" lineno="151562">
<summary>
Send and receive UDP traffic on the zebra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_zebra_port" lineno="151579">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zebra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_zebra_port" lineno="151595">
<summary>
Bind TCP sockets to the zebra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_zebra_port" lineno="151615">
<summary>
Bind UDP sockets to the zebra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_zebra_port" lineno="151635">
<summary>
Do not audit attempts to sbind to zebra port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_zebra_port" lineno="151654">
<summary>
Make a TCP connection to the zebra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_zebra_port" lineno="151671">
<summary>
Do not audit attempts to make a TCP connection to zebra port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zebra_client_packets" lineno="151691">
<summary>
Send zebra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zebra_client_packets" lineno="151710">
<summary>
Do not audit attempts to send zebra_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zebra_client_packets" lineno="151729">
<summary>
Receive zebra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zebra_client_packets" lineno="151748">
<summary>
Do not audit attempts to receive zebra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zebra_client_packets" lineno="151767">
<summary>
Send and receive zebra_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zebra_client_packets" lineno="151783">
<summary>
Do not audit attempts to send and receive zebra_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zebra_client_packets" lineno="151798">
<summary>
Relabel packets to zebra_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zebra_server_packets" lineno="151818">
<summary>
Send zebra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zebra_server_packets" lineno="151837">
<summary>
Do not audit attempts to send zebra_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zebra_server_packets" lineno="151856">
<summary>
Receive zebra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zebra_server_packets" lineno="151875">
<summary>
Do not audit attempts to receive zebra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zebra_server_packets" lineno="151894">
<summary>
Send and receive zebra_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zebra_server_packets" lineno="151910">
<summary>
Do not audit attempts to send and receive zebra_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zebra_server_packets" lineno="151925">
<summary>
Relabel packets to zebra_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_zented_port" lineno="151947">
<summary>
Send and receive TCP traffic on the zented port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_zented_port" lineno="151966">
<summary>
Send UDP traffic on the zented port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_zented_port" lineno="151985">
<summary>
Do not audit attempts to send UDP traffic on the zented port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_zented_port" lineno="152004">
<summary>
Receive UDP traffic on the zented port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_zented_port" lineno="152023">
<summary>
Do not audit attempts to receive UDP traffic on the zented port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_zented_port" lineno="152042">
<summary>
Send and receive UDP traffic on the zented port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_zented_port" lineno="152059">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zented port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_zented_port" lineno="152075">
<summary>
Bind TCP sockets to the zented port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_zented_port" lineno="152095">
<summary>
Bind UDP sockets to the zented port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_zented_port" lineno="152115">
<summary>
Do not audit attempts to sbind to zented port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_zented_port" lineno="152134">
<summary>
Make a TCP connection to the zented port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_zented_port" lineno="152151">
<summary>
Do not audit attempts to make a TCP connection to zented port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zented_client_packets" lineno="152171">
<summary>
Send zented_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zented_client_packets" lineno="152190">
<summary>
Do not audit attempts to send zented_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zented_client_packets" lineno="152209">
<summary>
Receive zented_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zented_client_packets" lineno="152228">
<summary>
Do not audit attempts to receive zented_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zented_client_packets" lineno="152247">
<summary>
Send and receive zented_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zented_client_packets" lineno="152263">
<summary>
Do not audit attempts to send and receive zented_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zented_client_packets" lineno="152278">
<summary>
Relabel packets to zented_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zented_server_packets" lineno="152298">
<summary>
Send zented_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zented_server_packets" lineno="152317">
<summary>
Do not audit attempts to send zented_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zented_server_packets" lineno="152336">
<summary>
Receive zented_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zented_server_packets" lineno="152355">
<summary>
Do not audit attempts to receive zented_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zented_server_packets" lineno="152374">
<summary>
Send and receive zented_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zented_server_packets" lineno="152390">
<summary>
Do not audit attempts to send and receive zented_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zented_server_packets" lineno="152405">
<summary>
Relabel packets to zented_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_zope_port" lineno="152427">
<summary>
Send and receive TCP traffic on the zope port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_zope_port" lineno="152446">
<summary>
Send UDP traffic on the zope port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_send_zope_port" lineno="152465">
<summary>
Do not audit attempts to send UDP traffic on the zope port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_receive_zope_port" lineno="152484">
<summary>
Receive UDP traffic on the zope port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_receive_zope_port" lineno="152503">
<summary>
Do not audit attempts to receive UDP traffic on the zope port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_sendrecv_zope_port" lineno="152522">
<summary>
Send and receive UDP traffic on the zope port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_udp_sendrecv_zope_port" lineno="152539">
<summary>
Do not audit attempts to send and receive
UDP traffic on the zope port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_bind_zope_port" lineno="152555">
<summary>
Bind TCP sockets to the zope port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_udp_bind_zope_port" lineno="152575">
<summary>
Bind UDP sockets to the zope port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_dontaudit_udp_bind_zope_port" lineno="152595">
<summary>
Do not audit attempts to sbind to zope port.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_tcp_connect_zope_port" lineno="152614">
<summary>
Make a TCP connection to the zope port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_dontaudit_tcp_connect_zope_port" lineno="152631">
<summary>
Do not audit attempts to make a TCP connection to zope port.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zope_client_packets" lineno="152651">
<summary>
Send zope_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zope_client_packets" lineno="152670">
<summary>
Do not audit attempts to send zope_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zope_client_packets" lineno="152689">
<summary>
Receive zope_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zope_client_packets" lineno="152708">
<summary>
Do not audit attempts to receive zope_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zope_client_packets" lineno="152727">
<summary>
Send and receive zope_client packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zope_client_packets" lineno="152743">
<summary>
Do not audit attempts to send and receive zope_client packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zope_client_packets" lineno="152758">
<summary>
Relabel packets to zope_client the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_send_zope_server_packets" lineno="152778">
<summary>
Send zope_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_dontaudit_send_zope_server_packets" lineno="152797">
<summary>
Do not audit attempts to send zope_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_receive_zope_server_packets" lineno="152816">
<summary>
Receive zope_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_dontaudit_receive_zope_server_packets" lineno="152835">
<summary>
Do not audit attempts to receive zope_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_sendrecv_zope_server_packets" lineno="152854">
<summary>
Send and receive zope_server packets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_dontaudit_sendrecv_zope_server_packets" lineno="152870">
<summary>
Do not audit attempts to send and receive zope_server packets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="corenet_relabelto_zope_server_packets" lineno="152885">
<summary>
Relabel packets to zope_server the packet type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="corenet_tcp_sendrecv_lo_if" lineno="152908">
<summary>
Send and receive TCP network traffic on the lo interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_udp_send_lo_if" lineno="152927">
<summary>
Send UDP network traffic on the lo interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_udp_receive_lo_if" lineno="152946">
<summary>
Receive UDP network traffic on the lo interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_udp_sendrecv_lo_if" lineno="152965">
<summary>
Send and receive UDP network traffic on the lo interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
<interface name="corenet_raw_send_lo_if" lineno="152981">
<summary>
Send raw IP packets on the lo interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="corenet_raw_receive_lo_if" lineno="153000">
<summary>
Receive raw IP packets on the lo interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="corenet_raw_sendrecv_lo_if" lineno="153019">
<summary>
Send and receive raw IP packets on the lo interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="both" weight="10"/>
</interface>
</module>
<module name="devices" filename="policy/modules/kernel/devices.if">
<summary>
Device nodes and interfaces for many basic system devices.
</summary>
<desc>
<p>
This module creates the device node concept and provides
the policy for many of the device files. Notable exceptions are
the mass storage and terminal devices that are covered by other
modules.
</p>
<p>
This module creates the concept of a device node. That is a
char or block device file, usually in /dev. All types that
are used to label device nodes should use the dev_node macro.
</p>
<p>
Additionally, this module controls access to three things:
<ul>
<li>the device directories containing device nodes</li>
<li>device nodes as a group</li>
<li>individual access to specific device nodes covered by
this module.</li>
</ul>
</p>
</desc>
<required val="true">
Depended on by other required modules.
</required>
<interface name="dev_node" lineno="66">
<summary>
Make the specified type usable for device
nodes in a filesystem.
</summary>
<desc>
<p>
Make the specified type usable for device nodes
in a filesystem. Types used for device nodes that
do not use this interface, or an interface that
calls this one, will have unexpected behaviors
while the system is running.
</p>
<p>
Example:
</p>
<p>
type mydev_t;
dev_node(mydev_t)
allow mydomain_t mydev_t:chr_file read_chr_file_perms;
</p>
<p>
Related interfaces:
</p>
<ul>
<li>term_tty()</li>
<li>term_pty()</li>
</ul>
</desc>
<param name="type">
<summary>
Type to be used for device nodes.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="dev_associate" lineno="84">
<summary>
Associate the specified file type with device filesystem.
</summary>
<param name="file_type">
<summary>
The type of the file to be associated.
</summary>
</param>
</interface>
<interface name="dev_getattr_fs" lineno="103">
<summary>
Get attributes of device filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_mounton" lineno="121">
<summary>
Mount a filesystem on /dev
</summary>
<param name="domain">
<summary>
Domain allow access.
</summary>
</param>
</interface>
<interface name="dev_mounton_all_device_nodes" lineno="139">
<summary>
Allow caller domain to mounton all device nodes
</summary>
<param name="domain">
<summary>
Domain allow access.
</summary>
</param>
</interface>
<interface name="dev_relabel_all_dev_nodes" lineno="160">
<summary>
Allow full relabeling (to and from) of all device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="dev_relabel_all_dev_files" lineno="186">
<summary>
Allow full relabeling (to and from) of all device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="dev_list_all_dev_nodes" lineno="204">
<summary>
List all of the device nodes in a device directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_generic_dirs" lineno="223">
<summary>
Set the attributes of /dev directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_list_all_dev_nodes" lineno="241">
<summary>
Dontaudit attempts to list all device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_all_access_check" lineno="259">
<summary>
Dontaudit attempts to list all device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_add_entry_generic_dirs" lineno="277">
<summary>
Add entries to directories in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_remove_entry_generic_dirs" lineno="295">
<summary>
Add entries to directories in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_create_generic_dirs" lineno="313">
<summary>
Create a directory in the device directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_watch_generic_dirs" lineno="332">
<summary>
Watch generic device directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_delete_generic_dirs" lineno="350">
<summary>
Delete a directory in the device directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_generic_dirs" lineno="368">
<summary>
Manage of directories in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_relabel_generic_dev_dirs" lineno="386">
<summary>
Allow full relabeling (to and from) of directories in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_generic_files" lineno="404">
<summary>
dontaudit getattr generic files in /dev.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_generic_files" lineno="422">
<summary>
Read generic files in /dev.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_read_generic_files" lineno="440">
<summary>
Read generic files in /dev.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_rw_generic_files" lineno="458">
<summary>
Read and write generic files in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_delete_generic_files" lineno="476">
<summary>
Delete generic files in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_generic_files" lineno="494">
<summary>
Create a file in the device directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_generic_pipes" lineno="512">
<summary>
Dontaudit getattr on generic pipes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_write_generic_sockets" lineno="530">
<summary>
Write generic socket files in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_generic_blk_files" lineno="548">
<summary>
Allow getattr on generic block devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rename_generic_blk_files" lineno="566">
<summary>
Rename generic block device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_generic_sock_files" lineno="584">
<summary>
write generic sock files in /dev. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_generic_blk_files" lineno="599">
<summary>
Dontaudit getattr on generic block devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_generic_blk_files" lineno="617">
<summary>
Dontaudit setattr on generic block devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_create_generic_blk_files" lineno="635">
<summary>
Create generic block device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_delete_generic_blk_files" lineno="653">
<summary>
Delete generic block device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_generic_chr_files" lineno="671">
<summary>
Allow getattr for generic character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_generic_chr_files" lineno="689">
<summary>
Dontaudit getattr for generic character device files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_rename_generic_chr_files" lineno="707">
<summary>
Rename generic character device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_generic_chr_files" lineno="725">
<summary>
Dontaudit setattr for generic character device files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_generic_chr_files" lineno="743">
<summary>
Read generic character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_generic_chr_files" lineno="761">
<summary>
Read and write generic character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_generic_blk_files" lineno="779">
<summary>
Read and write generic block device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_rw_generic_chr_files" lineno="797">
<summary>
Dontaudit attempts to read/write generic character device files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_create_generic_chr_files" lineno="815">
<summary>
Create generic character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_delete_generic_chr_files" lineno="833">
<summary>
Delete generic character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_relabelfrom_generic_chr_files" lineno="851">
<summary>
Relabel from generic character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_generic_symlinks" lineno="870">
<summary>
Do not audit attempts to set the attributes
of symbolic links in device directories (/dev).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_create_generic_symlinks" lineno="888">
<summary>
Create symbolic links in device directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_delete_generic_symlinks" lineno="906">
<summary>
Delete symbolic links in device directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_generic_symlinks" lineno="924">
<summary>
Read symbolic links in device directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_generic_symlinks" lineno="942">
<summary>
Create, delete, read, and write symbolic links in device directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_relabel_generic_symlinks" lineno="960">
<summary>
Relabel symbolic links in device directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_all_dev_nodes" lineno="978">
<summary>
Create, delete, read, and write device nodes in device directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_rw_generic_dev_nodes" lineno="1014">
<summary>
Dontaudit getattr for generic device files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_generic_blk_files" lineno="1032">
<summary>
Read block device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_generic_blk_files" lineno="1050">
<summary>
Create, delete, read, and write block device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_generic_chr_files" lineno="1068">
<summary>
Create, delete, read, and write character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_filetrans" lineno="1103">
<summary>
Create, read, and write device nodes. The node
will be transitioned to the type provided.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="file">
<summary>
Type to which the created node will be transitioned.
</summary>
</param>
<param name="objectclass(es)">
<summary>
Object class(es) (single or set including {}) for which this
the transition will occur.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="dev_tmpfs_filetrans_dev" lineno="1138">
<summary>
Create, read, and write device nodes. The node
will be transitioned to the type provided. This is
a temporary interface until devtmpfs functionality
fixed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="objectclass(es)">
<summary>
Object class(es) (single or set including {}) for which this
the transition will occur.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="dev_getattr_all" lineno="1156">
<summary>
Allow getattr on all device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_all_blk_files" lineno="1176">
<summary>
Getattr on all block file device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="dev_lock_all_blk_files" lineno="1196">
<summary>
Lock on all block file device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="dev_read_all_blk_files" lineno="1216">
<summary>
Read on all block file device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="dev_dontaudit_getattr_all_blk_files" lineno="1235">
<summary>
Dontaudit getattr on all block file device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_getattr_all_chr_files" lineno="1255">
<summary>
Getattr on all character file device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="dev_dontaudit_getattr_all_chr_files" lineno="1274">
<summary>
Dontaudit getattr on all character file device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_setattr_all_blk_files" lineno="1294">
<summary>
Setattr on all block file device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="dev_setattr_all_chr_files" lineno="1313">
<summary>
Setattr on all character file device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="dev_dontaudit_read_all_blk_files" lineno="1331">
<summary>
Dontaudit read on all block file device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_write_all_blk_files" lineno="1349">
<summary>
Dontaudit write on all block file device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_read_all_chr_files" lineno="1367">
<summary>
Dontaudit read on all character file device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_write_all_chr_files" lineno="1385">
<summary>
Dontaudit write on all character file device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_create_all_files" lineno="1403">
<summary>
Create all device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_create_all_blk_files" lineno="1421">
<summary>
Create all block device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_create_all_chr_files" lineno="1439">
<summary>
Create all character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_all_inherited_chr_files" lineno="1457">
<summary>
rw all inherited character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_all_inherited_blk_files" lineno="1475">
<summary>
rw all inherited blk device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_delete_all_blk_files" lineno="1493">
<summary>
Delete all block device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_delete_all_chr_files" lineno="1511">
<summary>
Delete all character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rename_all_blk_files" lineno="1529">
<summary>
Rename all block device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rename_all_chr_files" lineno="1547">
<summary>
Rename all character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_all_blk_files" lineno="1565">
<summary>
Read, write, create, and delete all block device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_all_chr_files" lineno="1589">
<summary>
Read, write, create, and delete all character device files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_agp_dev" lineno="1609">
<summary>
Getattr the agp devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_agp" lineno="1627">
<summary>
Read and write the agp devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_apm_bios_dev" lineno="1645">
<summary>
Get the attributes of the apm bios device node.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_apm_bios_dev" lineno="1664">
<summary>
Do not audit attempts to get the attributes of
the apm bios device node.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_setattr_apm_bios_dev" lineno="1682">
<summary>
Set the attributes of the apm bios device node.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_apm_bios_dev" lineno="1701">
<summary>
Do not audit attempts to set the attributes of
the apm bios device node.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_rw_apm_bios" lineno="1719">
<summary>
Read and write the apm bios.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_autofs_dev" lineno="1737">
<summary>
Get the attributes of the autofs device node.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_autofs_dev" lineno="1756">
<summary>
Do not audit attempts to get the attributes of
the autofs device node.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_setattr_autofs_dev" lineno="1774">
<summary>
Set the attributes of the autofs device node.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_autofs_dev" lineno="1793">
<summary>
Do not audit attempts to set the attributes of
the autofs device node.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_rw_autofs" lineno="1811">
<summary>
Read and write the autofs device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_relabel_autofs_dev" lineno="1829">
<summary>
Relabel the autofs device node.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_cardmgr" lineno="1847">
<summary>
Read and write the PCMCIA card manager device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_rw_cardmgr" lineno="1866">
<summary>
Do not audit attempts to read and
write the PCMCIA card manager device.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_create_cardmgr_dev" lineno="1886">
<summary>
Create, read, write, and delete
the PCMCIA card manager device
with the correct type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_cardmgr_dev" lineno="1906">
<summary>
Create, read, write, and delete
the PCMCIA card manager device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_filetrans_cardmgr" lineno="1932">
<summary>
Automatic type transition to the type
for PCMCIA card manager device nodes when
created in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="dev_filetrans_xserver_misc" lineno="1952">
<summary>
Automatic type transition to the type
for xserver misc device nodes when
created in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_cpu_dev" lineno="1971">
<summary>
Get the attributes of the CPU
microcode and id interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_cpu_dev" lineno="1990">
<summary>
Set the attributes of the CPU
microcode and id interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_cpuid" lineno="2008">
<summary>
Read the CPU identity.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_cpu_microcode" lineno="2027">
<summary>
Read and write the the CPU microcode device. This
is required to load CPU microcode.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_crash" lineno="2045">
<summary>
Read the kernel crash device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_cachefiles" lineno="2063">
<summary>
Read and write to the cachefilesd device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_crypto" lineno="2081">
<summary>
Read and write the the hardware SSL accelerator.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_ecryptfs" lineno="2099">
<summary>
Read and write the the ecrypt filesystem device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_dlm_control" lineno="2117">
<summary>
Set the attributes of the dlm control devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_dlm_control" lineno="2135">
<summary>
Read and write the the dlm control device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_dma_dev" lineno="2153">
<summary>
Read and write the the dma device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_dri_dev" lineno="2171">
<summary>
getattr the dri devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_dri_dev" lineno="2189">
<summary>
Setattr the dri devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_map_dri" lineno="2207">
<summary>
Mmap the dri devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_dri" lineno="2225">
<summary>
Read and write the dri devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_inherited_dri" lineno="2244">
<summary>
Read and write the dri devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_rw_dri" lineno="2263">
<summary>
Dontaudit read and write on the dri devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_manage_dri_dev" lineno="2281">
<summary>
Create, read, write, and delete the dri devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_filetrans_dri" lineno="2305">
<summary>
Automatic type transition to the type
for DRI device nodes when created in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="dev_getattr_input_dev" lineno="2323">
<summary>
Get the attributes of the event devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_input_dev" lineno="2342">
<summary>
Set the attributes of the event devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_input" lineno="2361">
<summary>
Read input event devices (/dev/input).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_input_dev" lineno="2379">
<summary>
Read input event devices (/dev/input).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_inherited_input_dev" lineno="2397">
<summary>
Read input event devices (/dev/input).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_ipmi_dev" lineno="2416">
<summary>
Read ipmi devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_ipmi_dev" lineno="2434">
<summary>
Read and write ipmi devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_ipmi_dev" lineno="2452">
<summary>
Manage ipmi devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_filetrans_ipmi" lineno="2477">
<summary>
Automatic type transition to the type
for PCMCIA card manager device nodes when
created in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="dev_getattr_infiniband_dev" lineno="2495">
<summary>
Get attributes of infiniband devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_infiniband_dev" lineno="2513">
<summary>
Read infiniband devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_infiniband_dev" lineno="2532">
<summary>
Read and write ipmi devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_infiniband_mgmt_dev" lineno="2552">
<summary>
Read infiniband mgmt devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_infiniband_mgmt_dev" lineno="2571">
<summary>
Read and write ipmi devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_framebuffer_dev" lineno="2590">
<summary>
Get the attributes of the framebuffer device node.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_framebuffer_dev" lineno="2608">
<summary>
Set the attributes of the framebuffer device node.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_framebuffer_dev" lineno="2627">
<summary>
Dot not audit attempts to set the attributes
of the framebuffer device node.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_framebuffer" lineno="2645">
<summary>
Read the framebuffer.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_read_framebuffer" lineno="2663">
<summary>
Do not audit attempts to read the framebuffer.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_write_framebuffer" lineno="2681">
<summary>
Write the framebuffer.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_map_framebuffer" lineno="2699">
<summary>
Mmap the framebuffer.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_framebuffer" lineno="2717">
<summary>
Read and write the framebuffer.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_kmsg" lineno="2735">
<summary>
Read the kernel messages
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_read_kmsg" lineno="2753">
<summary>
Do not audit attempts to read the kernel messages
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_write_kmsg" lineno="2771">
<summary>
Write to the kernel messages device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_mounton_kmsg" lineno="2789">
<summary>
Mounton the kernel messages device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_ksm_dev" lineno="2807">
<summary>
Get the attributes of the ksm devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_ksm_dev" lineno="2825">
<summary>
Set the attributes of the ksm devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_ksm" lineno="2843">
<summary>
Read the ksm devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_ksm" lineno="2861">
<summary>
Read and write to ksm devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_kvm_dev" lineno="2879">
<summary>
Get the attributes of the kvm devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_kvm_dev" lineno="2897">
<summary>
Set the attributes of the kvm devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_kvm" lineno="2915">
<summary>
Read the kvm devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_kvm" lineno="2933">
<summary>
Read and write to kvm devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_sev" lineno="2951">
<summary>
Read and write to sev devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_lirc" lineno="2969">
<summary>
Read the lirc device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_lirc" lineno="2987">
<summary>
Read and write the lirc device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_filetrans_lirc" lineno="3011">
<summary>
Automatic type transition to the type
for lirc device nodes when created in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="dev_getattr_loop_control" lineno="3029">
<summary>
Get the attributes of the loop comtrol device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_loop_control" lineno="3047">
<summary>
Read the loop comtrol device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_loop_control" lineno="3065">
<summary>
Read and write the loop control device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_rw_loop_control" lineno="3083">
<summary>
Do not audit attempts to read and write loop control device.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_delete_loop_control_dev" lineno="3101">
<summary>
Delete the loop control device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_lvm_control" lineno="3119">
<summary>
Get the attributes of the loop comtrol device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_lvm_control" lineno="3137">
<summary>
Read the lvm comtrol device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_lvm_control" lineno="3155">
<summary>
Read and write the lvm control device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_rw_lvm_control" lineno="3173">
<summary>
Do not audit attempts to read and write lvm control device.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_delete_lvm_control_dev" lineno="3191">
<summary>
Delete the lvm control device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_memory_dev" lineno="3209">
<summary>
dontaudit getattr raw memory devices (e.g. /dev/mem).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_raw_memory" lineno="3227">
<summary>
Read raw memory devices (e.g. /dev/mem).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_raw_memory_reader" lineno="3250">
<summary>
Allow to be reader of raw memory devices (e.g. /dev/mem).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_read_raw_memory" lineno="3269">
<summary>
Do not audit attempts to read raw memory devices
(e.g. /dev/mem).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_write_raw_memory" lineno="3288">
<summary>
Do not audit attempts to write to raw memory devices
(e.g. /dev/mem).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_write_raw_memory" lineno="3306">
<summary>
Write raw memory devices (e.g. /dev/mem).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_raw_memory_writer" lineno="3328">
<summary>
Allow to be writer of raw memory devices (e.g. /dev/mem).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rx_raw_memory" lineno="3346">
<summary>
Read and execute raw memory devices (e.g. /dev/mem).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_wx_raw_memory" lineno="3365">
<summary>
Write and execute raw memory devices (e.g. /dev/mem).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_misc_dev" lineno="3384">
<summary>
Get the attributes of miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_misc_dev" lineno="3403">
<summary>
Do not audit attempts to get the attributes
of miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_setattr_misc_dev" lineno="3421">
<summary>
Set the attributes of miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_misc_dev" lineno="3440">
<summary>
Do not audit attempts to set the attributes
of miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_misc" lineno="3458">
<summary>
Read miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_misc" lineno="3476">
<summary>
Write miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_rw_misc" lineno="3494">
<summary>
Do not audit attempts to read and write miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_getattr_modem_dev" lineno="3512">
<summary>
Get the attributes of the modem devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_modem_dev" lineno="3530">
<summary>
Set the attributes of the modem devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_modem" lineno="3548">
<summary>
Read the modem devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_modem" lineno="3566">
<summary>
Read and write to modem devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_monitor_dev" lineno="3584">
<summary>
Get the attributes of the monitor devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_monitor_dev" lineno="3602">
<summary>
Set the attributes of the monitor devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_monitor_dev" lineno="3620">
<summary>
Read the monitor devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_monitor_dev" lineno="3638">
<summary>
Read and write to monitor devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_mouse_dev" lineno="3656">
<summary>
Get the attributes of the mouse devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_mouse_dev" lineno="3674">
<summary>
Set the attributes of the mouse devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_mouse" lineno="3692">
<summary>
Read the mouse devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_mouse" lineno="3710">
<summary>
Read and write to mouse devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_mtrr_dev" lineno="3729">
<summary>
Get the attributes of the memory type range
registers (MTRR) device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_mtrr" lineno="3762">
<summary>
Write the memory type range
registers (MTRR). (Deprecated)
</summary>
<desc>
<p>
Write the memory type range
registers (MTRR). This interface has
been deprecated, dev_rw_mtrr() should be
used instead.
</p>
<p>
The MTRR device ioctls can be used for
reading and writing; thus, write access to the
device cannot be separated from read access.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_write_mtrr" lineno="3778">
<summary>
Do not audit attempts to write the memory type
range registers (MTRR).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_read_mtrr" lineno="3798">
<summary>
Do not audit attempts to read the memory type
range registers (MTRR).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_mtrr" lineno="3817">
<summary>
Read the memory type range registers (MTRR).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_mtrr" lineno="3836">
<summary>
Read and write the memory type range registers (MTRR).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_netcontrol_dev" lineno="3855">
<summary>
Get the attributes of the network control device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_netcontrol" lineno="3873">
<summary>
Read the network control identity.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_netcontrol" lineno="3891">
<summary>
Read and write the the network control device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_null_dev" lineno="3909">
<summary>
Get the attributes of the null device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_null_dev" lineno="3927">
<summary>
Set the attributes of the null device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_delete_null" lineno="3945">
<summary>
Delete the null device (/dev/null).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_null" lineno="3963">
<summary>
Read and write to the null device (/dev/null).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_create_null_dev" lineno="3981">
<summary>
Create the null device (/dev/null).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_service_status_null_dev" lineno="3999">
<summary>
Get the status of a null device service.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_config_null_dev_service" lineno="4017">
<summary>
Configure null_device as a unit files.
</summary>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
</interface>
<interface name="dev_read_nvme" lineno="4038">
<summary>
Read Non-Volatile Memory Host Controller Interface. (Deprecated)
</summary>
<desc>
Use storage_raw_read_fixed_disk() instead.
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_nvme" lineno="4057">
<summary>
Read/Write Non-Volatile Memory Host Controller Interface. (Deprecated)
</summary>
<desc>
Use storage_raw_read_fixed_disk() and
storage_raw_write_fixed_disk() instead.
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_nvram_dev" lineno="4074">
<summary>
Do not audit attempts to get the attributes
of the BIOS non-volatile RAM device.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_nvram" lineno="4092">
<summary>
Read BIOS non-volatile RAM.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_nvram" lineno="4110">
<summary>
Read and write BIOS non-volatile RAM.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_printer_dev" lineno="4128">
<summary>
Get the attributes of the printer device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_printer_dev" lineno="4146">
<summary>
Set the attributes of the printer device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_append_printer" lineno="4165">
<summary>
Append the printer device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_printer" lineno="4183">
<summary>
Read and write the printer device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_relabel_printer" lineno="4201">
<summary>
Relabel the printer device node.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_printer" lineno="4219">
<summary>
Read and write the printer device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_qemu_dev" lineno="4239">
<summary>
Get the attributes of the QEMU
microcode and id interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_qemu_dev" lineno="4258">
<summary>
Set the attributes of the QEMU
microcode and id interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_qemu" lineno="4276">
<summary>
Read the QEMU device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_qemu" lineno="4294">
<summary>
Read and write the the QEMU device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_rand" lineno="4328">
<summary>
Read from random number generator
devices (e.g., /dev/random).
</summary>
<desc>
<p>
Allow the specified domain to read from random number
generator devices (e.g., /dev/random). Typically this is
used in situations when a cryptographically secure random
number is needed.
</p>
<p>
Related interface:
</p>
<ul>
<li>dev_read_urand()</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="dev_dontaudit_read_rand" lineno="4347">
<summary>
Do not audit attempts to read from random
number generator devices (e.g., /dev/random)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_append_rand" lineno="4366">
<summary>
Do not audit attempts to append to the random
number generator devices (e.g., /dev/random)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_write_rand" lineno="4386">
<summary>
Write to the random device (e.g., /dev/random). This adds
entropy used to generate the random data read from the
random device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_realtime_clock" lineno="4404">
<summary>
Read the realtime clock (/dev/rtc).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_realtime_clock" lineno="4422">
<summary>
Set the realtime clock (/dev/rtc).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_realtime_clock" lineno="4442">
<summary>
Read and set the realtime clock (/dev/rtc).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_scanner_dev" lineno="4457">
<summary>
Get the attributes of the scanner device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_scanner_dev" lineno="4476">
<summary>
Do not audit attempts to get the attributes of
the scanner device.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_setattr_scanner_dev" lineno="4494">
<summary>
Set the attributes of the scanner device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_scanner_dev" lineno="4513">
<summary>
Do not audit attempts to set the attributes of
the scanner device.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_rw_scanner" lineno="4531">
<summary>
Read and write the scanner device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_sound_dev" lineno="4549">
<summary>
Get the attributes of the sound devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_sound_dev" lineno="4567">
<summary>
Set the attributes of the sound devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_sound" lineno="4585">
<summary>
Read the sound devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_sound" lineno="4604">
<summary>
Write the sound devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_sound_mixer" lineno="4622">
<summary>
Read the sound mixer devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_sound_mixer" lineno="4641">
<summary>
Write the sound mixer devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_power_mgmt_dev" lineno="4659">
<summary>
Get the attributes of the the power management device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_power_mgmt_dev" lineno="4677">
<summary>
Set the attributes of the the power management device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_power_management" lineno="4695">
<summary>
Read and write the the power management device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_smartcard_dev" lineno="4713">
<summary>
Getattr on smartcard devices
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_smartcard_dev" lineno="4732">
<summary>
dontaudit getattr on smartcard devices
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_rw_smartcard" lineno="4751">
<summary>
Read and write smartcard devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_smartcard" lineno="4769">
<summary>
Create, read, write, and delete smartcard devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_associate_sysfs" lineno="4787">
<summary>
Associate a file to a sysfs filesystem.
</summary>
<param name="file_type">
<summary>
The type of the file to be associated to sysfs.
</summary>
</param>
</interface>
<interface name="dev_getattr_sysfs_dirs" lineno="4805">
<summary>
Get the attributes of sysfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_sysfs_dirs" lineno="4823">
<summary>
Set the attributes of sysfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_sysfs_fs" lineno="4841">
<summary>
Get attributes of sysfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_mounton_sysfs" lineno="4859">
<summary>
Mount a filesystem on /sys
</summary>
<param name="domain">
<summary>
Domain allow access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_mounton_sysfs" lineno="4877">
<summary>
Dontaudit attempts to mount a filesystem on /sys
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_mount_sysfs_fs" lineno="4895">
<summary>
Mount sysfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_unmount_sysfs_fs" lineno="4913">
<summary>
Unmount sysfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_remount_sysfs_fs" lineno="4931">
<summary>
Remount sysfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_search_sysfs" lineno="4949">
<summary>
Search the sysfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_search_sysfs" lineno="4967">
<summary>
Do not audit attempts to search sysfs.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_list_sysfs" lineno="4985">
<summary>
List the contents of the sysfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_sysfs_dirs" lineno="5005">
<summary>
Write in a sysfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_access_check_sysfs" lineno="5023">
<summary>
Access check for a sysfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_write_sysfs_dirs" lineno="5041">
<summary>
Do not audit attempts to write in a sysfs directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_cpu_online" lineno="5064">
<summary>
Read cpu online hardware state information.
</summary>
<desc>
<p>
Allow the specified domain to read /sys/devices/system/cpu/online file.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_relabel_cpu_online" lineno="5083">
<summary>
Relabel cpu online hardware state information.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_sysfs" lineno="5113">
<summary>
Read hardware state information.
</summary>
<desc>
<p>
Allow the specified domain to read the contents of
the sysfs filesystem. This filesystem contains
information, parameters, and other settings on the
hardware installed on the system.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="dev_write_sysfs" lineno="5134">
<summary>
Allow caller to write to sysfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_sysfs" lineno="5153">
<summary>
Allow caller to r/w to sysfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_create_sysfs_files" lineno="5174">
<summary>
Allow caller create hardware state information files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_relabel_sysfs_dirs" lineno="5192">
<summary>
Relabel hardware state directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_relabel_all_sysfs" lineno="5210">
<summary>
Relabel hardware state files
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_sysfs_dirs" lineno="5230">
<summary>
Allow caller to modify hardware state information.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_sysfs" lineno="5248">
<summary>
Allow caller to modify hardware state information.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_map_sysfs" lineno="5268">
<summary>
Mmap the sysfs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_tpm" lineno="5286">
<summary>
Read the TPM device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_tpm" lineno="5304">
<summary>
Read and write the TPM device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_urand" lineno="5345">
<summary>
Read from pseudo random number generator devices (e.g., /dev/urandom).
</summary>
<desc>
<p>
Allow the specified domain to read from pseudo random number
generator devices (e.g., /dev/urandom). Typically this is
used in situations when a cryptographically secure random
number is not necessarily needed. One example is the Stack
Smashing Protector (SSP, formerly known as ProPolice) support
that may be compiled into programs.
</p>
<p>
Related interface:
</p>
<ul>
<li>dev_read_rand()</li>
</ul>
<p>
Related tunable:
</p>
<ul>
<li>global_ssp</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="dev_dontaudit_read_urand" lineno="5364">
<summary>
Do not audit attempts to read from pseudo
random devices (e.g., /dev/urandom)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_write_urand" lineno="5383">
<summary>
Write to the pseudo random device (e.g., /dev/urandom). This
sets the random number generator seed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_write_urand" lineno="5402">
<summary>
Do not audit attempts to write to pseudo
random devices (e.g., /dev/urandom)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_getattr_generic_usb_dev" lineno="5420">
<summary>
Getattr generic the USB devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_generic_usb_dev" lineno="5438">
<summary>
Setattr generic the USB devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_generic_usb_dev" lineno="5456">
<summary>
Read generic the USB devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_generic_usb_dev" lineno="5474">
<summary>
Read and write generic the USB devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_relabel_generic_usb_dev" lineno="5492">
<summary>
Relabel generic the USB devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_usbmon_dev" lineno="5510">
<summary>
Read USB monitor devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_map_usbmon_dev" lineno="5528">
<summary>
Mmap USB monitor devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_usbmon_dev" lineno="5546">
<summary>
Write USB monitor devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_mount_usbfs" lineno="5564">
<summary>
Mount a usbfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_associate_usbfs" lineno="5582">
<summary>
Associate a file to a usbfs filesystem.
</summary>
<param name="file_type">
<summary>
The type of the file to be associated to usbfs.
</summary>
</param>
</interface>
<interface name="dev_getattr_usbfs_dirs" lineno="5600">
<summary>
Get the attributes of a directory in the usb filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_usbfs_dirs" lineno="5619">
<summary>
Do not audit attempts to get the attributes
of a directory in the usb filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_search_usbfs" lineno="5637">
<summary>
Search the directory containing USB hardware information.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_list_usbfs" lineno="5655">
<summary>
Allow caller to get a list of usb hardware.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_usbfs_files" lineno="5676">
<summary>
Set the attributes of usbfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_usbfs" lineno="5696">
<summary>
Read USB hardware information using
the usbfs filesystem interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_usbfs" lineno="5716">
<summary>
Allow caller to modify usb hardware configuration files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_userio_dev" lineno="5736">
<summary>
Read and write userio device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_map_userio_dev" lineno="5754">
<summary>
Mmap the userio devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_video_dev" lineno="5772">
<summary>
Get the attributes of video4linux devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_video_dev" lineno="5791">
<summary>
Do not audit attempts to get the attributes
of video4linux device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_setattr_video_dev" lineno="5809">
<summary>
Set the attributes of video4linux device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_video_dev" lineno="5828">
<summary>
Do not audit attempts to set the attributes
of video4linux device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_video_dev" lineno="5846">
<summary>
Read the video4linux devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_map_video_dev" lineno="5864">
<summary>
Mmap the video4linux devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_video_dev" lineno="5883">
<summary>
Write the video4linux devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_getattr_vfio_dev" lineno="5901">
<summary>
Get the attributes of vfio devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_vfio_dev" lineno="5920">
<summary>
Do not audit attempts to get the attributes
of vfio device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_setattr_vfio_dev" lineno="5938">
<summary>
Set the attributes of vfio device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_setattr_vfio_dev" lineno="5957">
<summary>
Do not audit attempts to set the attributes
of vfio device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_read_vfio_dev" lineno="5975">
<summary>
Read the vfio devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_vfio_dev" lineno="5993">
<summary>
Write the vfio devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_vfio_dev" lineno="6011">
<summary>
Read and write the VFIO devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_vhost" lineno="6029">
<summary>
Allow read/write the vhost net device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_inherited_vhost" lineno="6047">
<summary>
Allow read/write inheretid the vhost net device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_map_vhost" lineno="6065">
<summary>
Allow map the vhost devices
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_vmware" lineno="6083">
<summary>
Read and write VMWare devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rwx_vmware" lineno="6101">
<summary>
Read, write, and mmap VMWare devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_watchdog" lineno="6120">
<summary>
Read from watchdog devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_write_watchdog" lineno="6138">
<summary>
Write to watchdog devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_watchdog" lineno="6156">
<summary>
RW to watchdog devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_wireless" lineno="6174">
<summary>
Read and write the the wireless device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_xen" lineno="6192">
<summary>
Read and write Xen devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_manage_xen" lineno="6211">
<summary>
Create, read, write, and delete Xen devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_filetrans_xen" lineno="6235">
<summary>
Automatic type transition to the type
for xen device nodes when created in /dev.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="dev_getattr_xserver_misc_dev" lineno="6253">
<summary>
Get the attributes of X server miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_xserver_misc_dev" lineno="6271">
<summary>
Set the attributes of X server miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_xserver_misc" lineno="6289">
<summary>
Read and write X server miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_leaked_xserver_misc" lineno="6308">
<summary>
Dontaudit attempts to Read and write X server miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_manage_xserver_misc" lineno="6326">
<summary>
Read and write X server miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_map_xserver_misc" lineno="6346">
<summary>
mmap X server miscellaneous devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_zero" lineno="6365">
<summary>
Read and write to the zero device (/dev/zero).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rwx_zero" lineno="6384">
<summary>
Read, write, and execute the zero device (/dev/zero).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_execmod_zero" lineno="6403">
<summary>
Execmod the zero device (/dev/zero).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_create_zero_dev" lineno="6422">
<summary>
Create the zero device (/dev/zero).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_unconfined" lineno="6440">
<summary>
Unconfined access to devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_dontaudit_getattr_all" lineno="6458">
<summary>
Dontaudit getattr on all device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="dev_getattr_mei" lineno="6477">
<summary>
Get the attributes of the mei devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_mei" lineno="6495">
<summary>
Read the mei devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_mei" lineno="6513">
<summary>
Read and write to mei devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_uhid_dev" lineno="6531">
<summary>
Read and write uhid devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_hypervkvp" lineno="6550">
<summary>
Allow read/write the hypervkvp device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_gpfs" lineno="6568">
<summary>
Allow read/write the hypervkvp device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_gpio" lineno="6586">
<summary>
Allow read/write the gpiochip device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_hypervvssd" lineno="6604">
<summary>
Allow read/write the hypervvssd device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_vsock" lineno="6622">
<summary>
Allow read the vsock device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_gnss" lineno="6640">
<summary>
Allow read/write the gnss device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_setattr_gnss" lineno="6658">
<summary>
Allow setattr the gnss device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_rw_papr_sysparm" lineno="6676">
<summary>
Allow read/write the papr-sysparm device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_read_hfi1" lineno="6694">
<summary>
Allow read the hfi1_[0-9]+ devices
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_filetrans_printer_named_dev" lineno="6712">
<summary>
Create all named devices with the correct label
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_filetrans_all_named_dev" lineno="6770">
<summary>
Create all named devices with the correct label
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_filetrans_xserver_named_dev" lineno="7600">
<summary>
Create all named devices with the correct label
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="dev_io_uring_cmd_on_all_dev_nodes" lineno="7666">
<summary>
Allow to use IORING_OP_URING_CMD on all device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
</module>
<module name="domain" filename="policy/modules/kernel/domain.if">
<summary>Core policy for domains.</summary>
<required val="true">
Contains the concept of a domain.
</required>
<interface name="domain_base_type" lineno="26">
<summary>
Make the specified type usable as a basic domain.
</summary>
<desc>
<p>
Make the specified type usable as a basic domain.
</p>
<p>
This is primarily used for kernel threads;
generally the domain_type() interface is
more appropriate for userland processes.
</p>
</desc>
<param name="type">
<summary>
Type to be used as a basic domain type.
</summary>
</param>
</interface>
<interface name="domain_type" lineno="75">
<summary>
Make the specified type usable as a domain.
</summary>
<desc>
<p>
Make the specified type usable as a domain. This,
or an interface that calls this interface, must be
used on all types that are used as domains.
</p>
<p>
Related interfaces:
</p>
<ul>
<li>application_domain()</li>
<li>init_daemon_domain()</li>
<li>init_domaion()</li>
<li>init_ranged_daemon_domain()</li>
<li>init_ranged_domain()</li>
<li>init_ranged_system_domain()</li>
<li>init_script_domain()</li>
<li>init_system_domain()</li>
</ul>
<p>
Example:
</p>
<p>
type mydomain_t;
domain_type(mydomain_t)
type myfile_t;
files_type(myfile_t)
allow mydomain_t myfile_t:file read_file_perms;
</p>
</desc>
<param name="type">
<summary>
Type to be used as a domain type.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="domain_entry_file" lineno="100">
<summary>
Make the specified type usable as
an entry point for the domain.
</summary>
<param name="domain">
<summary>
Domain to be entered.
</summary>
</param>
<param name="type">
<summary>
Type of program used for entering
the domain.
</summary>
</param>
</interface>
<interface name="domain_interactive_fd" lineno="128">
<summary>
Make the file descriptors of the specified
domain for interactive use (widely inheritable)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_dyntrans_type" lineno="157">
<summary>
Allow the specified domain to perform
dynamic transitions.
</summary>
<desc>
<p>
Allow the specified domain to perform
dynamic transitions.
</p>
<p>
This violates process tranquility, and it
is strongly suggested that this not be used.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_system_change_exemption" lineno="177">
<summary>
Makes caller and execption to the constraint
preventing changing to the system user
identity and system role.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_subj_id_change_exemption" lineno="196">
<summary>
Makes caller an exception to the constraint preventing
changing of user identity.
</summary>
<param name="domain">
<summary>
The process type to make an exception to the constraint.
</summary>
</param>
</interface>
<interface name="domain_role_change_exemption" lineno="215">
<summary>
Makes caller an exception to the constraint preventing
changing of role.
</summary>
<param name="domain">
<summary>
The process type to make an exception to the constraint.
</summary>
</param>
</interface>
<interface name="domain_obj_id_change_exemption" lineno="235">
<summary>
Makes caller an exception to the constraint preventing
changing the user identity in object contexts.
</summary>
<param name="domain">
<summary>
The process type to make an exception to the constraint.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_user_exemption_target" lineno="270">
<summary>
Make the specified domain the target of
the user domain exception of the
SELinux role and identity change
constraints.
</summary>
<desc>
<p>
Make the specified domain the target of
the user domain exception of the
SELinux role and identity change
constraints.
</p>
<p>
This interface is needed to decouple
the user domains from the base module.
It should not be used other than on
user domains.
</p>
</desc>
<param name="domain">
<summary>
Domain target for user exemption.
</summary>
</param>
</interface>
<interface name="domain_cron_exemption_source" lineno="305">
<summary>
Make the specified domain the source of
the cron domain exception of the
SELinux role and identity change
constraints.
</summary>
<desc>
<p>
Make the specified domain the source of
the cron domain exception of the
SELinux role and identity change
constraints.
</p>
<p>
This interface is needed to decouple
the cron domains from the base module.
It should not be used other than on
cron domains.
</p>
</desc>
<param name="domain">
<summary>
Domain target for user exemption.
</summary>
</param>
</interface>
<interface name="domain_cron_exemption_target" lineno="340">
<summary>
Make the specified domain the target of
the cron domain exception of the
SELinux role and identity change
constraints.
</summary>
<desc>
<p>
Make the specified domain the target of
the cron domain exception of the
SELinux role and identity change
constraints.
</p>
<p>
This interface is needed to decouple
the cron domains from the base module.
It should not be used other than on
user cron jobs.
</p>
</desc>
<param name="domain">
<summary>
Domain target for user exemption.
</summary>
</param>
</interface>
<interface name="domain_use_interactive_fds" lineno="368">
<summary>
Inherit and use file descriptors from
domains with interactive programs.
</summary>
<desc>
<p>
Allow the specified domain to inherit and use file
descriptors from domains with interactive programs.
This does not allow access to the objects being referenced
by the file descriptors.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="1"/>
</interface>
<interface name="domain_dontaudit_use_interactive_fds" lineno="388">
<summary>
Do not audit attempts to inherit file
descriptors from domains with interactive
programs.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_sigchld_interactive_fds" lineno="408">
<summary>
Send a SIGCHLD signal to domains whose file
discriptors are widely inheritable.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_setpriority_all_domains" lineno="427">
<summary>
Set the nice level of all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_signal_all_domains" lineno="446">
<summary>
Send general signals to all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_dontaudit_signal_all_domains" lineno="466">
<summary>
Do not audit attempts to send general
signals to all domains.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_signull_all_domains" lineno="485">
<summary>
Send a null signal to all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_dontaudit_signull_all_domains" lineno="505">
<summary>
Do not audit attempts to send
signulls to all domains.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_sigstop_all_domains" lineno="524">
<summary>
Send a stop signal to all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_sigchld_all_domains" lineno="543">
<summary>
Send a child terminated signal to all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_kill_all_domains" lineno="562">
<summary>
Send a kill signal to all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_unix_read_all_semaphores" lineno="582">
<summary>
Allow unix_read all domains semaphores
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_destroy_all_semaphores" lineno="601">
<summary>
Destroy all domains semaphores
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_search_all_domains_state" lineno="619">
<summary>
Search the process state directory (/proc/pid) of all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_read_view_all_domains_keyrings" lineno="638">
<summary>
Allow read and view of process kernel keyrings
</summary>
<param name="domain">
<summary>
Domain to dontaudit.
</summary>
</param>
</interface>
<interface name="domain_rw_all_domains_keyrings" lineno="656">
<summary>
Allow read and write of process kernel keyrings
</summary>
<param name="domain">
<summary>
Domain to dontaudit.
</summary>
</param>
</interface>
<interface name="domain_manage_all_domains_keyrings" lineno="674">
<summary>
Allow manage of process kernel keyrings
</summary>
<param name="domain">
<summary>
Domain to dontaudit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_search_all_domains_keyrings" lineno="692">
<summary>
Dontaudit search of process kernel keyrings
</summary>
<param name="domain">
<summary>
Domain to dontaudit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_link_all_domains_keyrings" lineno="710">
<summary>
Dontaudit link of process kernel keyrings
</summary>
<param name="domain">
<summary>
Domain to dontaudit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_search_all_domains_state" lineno="729">
<summary>
Do not audit attempts to search the process
state directory (/proc/pid) of all domains.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_read_all_domains_state" lineno="748">
<summary>
Read the process state (/proc/pid) of all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_getattr_all_domains" lineno="770">
<summary>
Get the attributes of all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_dontaudit_getattr_all_domains" lineno="789">
<summary>
Do not audit attempts to get the attributes
of all domains.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_read_confined_domains_state" lineno="808">
<summary>
Read the process state (/proc/pid) of all confined domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_getattr_confined_domains" lineno="834">
<summary>
Get the attributes of all confined domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_ptrace_all_domains" lineno="853">
<summary>
Ptrace all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_dontaudit_ptrace_all_domains" lineno="882">
<summary>
Do not audit attempts to ptrace all domains.
</summary>
<desc>
<p>
Do not audit attempts to ptrace all domains.
</p>
<p>
Generally this needs to be suppressed because procps tries to access
/proc/pid/environ and this now triggers a ptrace check in recent kernels
(2.4 and 2.6).
</p>
</desc>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_ptrace_confined_domains" lineno="910">
<summary>
Do not audit attempts to ptrace confined domains.
</summary>
<desc>
<p>
Do not audit attempts to ptrace confined domains.
</p>
<p>
Generally this needs to be suppressed because procps tries to access
/proc/pid/environ and this now triggers a ptrace check in recent kernels
(2.4 and 2.6).
</p>
</desc>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_read_all_domains_state" lineno="929">
<summary>
Do not audit attempts to read the process
state (/proc/pid) of all domains.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_list_all_domains_state" lineno="954">
<summary>
Do not audit attempts to read the process state
directories of all domains.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_getsession_all_domains" lineno="972">
<summary>
Get the session ID of all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getsession_all_domains" lineno="991">
<summary>
Do not audit attempts to get the
session ID of all domains.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_getpgid_all_domains" lineno="1009">
<summary>
Get the process group ID of all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_getsched_all_domains" lineno="1027">
<summary>
Get the scheduler information of all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_getcap_all_domains" lineno="1045">
<summary>
Get the capability information of all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_getattr_all_sockets" lineno="1074">
<summary>
Get the attributes of all domains
sockets, for all socket types.
</summary>
<desc>
<p>
Get the attributes of all domains
sockets, for all socket types.
</p>
<p>
This is commonly used for domains
that can use lsof on all domains.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_sockets" lineno="1103">
<summary>
Do not audit attempts to get the attributes
of all domains sockets, for all socket types.
</summary>
<desc>
<p>
Do not audit attempts to get the attributes
of all domains sockets, for all socket types.
</p>
<p>
This interface was added for PCMCIA cardmgr
and is probably excessive.
</p>
</desc>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_tcp_sockets" lineno="1122">
<summary>
Do not audit attempts to get the attributes
of all domains TCP sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_udp_sockets" lineno="1141">
<summary>
Do not audit attempts to get the attributes
of all domains UDP sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_rw_all_udp_sockets" lineno="1160">
<summary>
Do not audit attempts to read or write
all domains UDP sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_key_sockets" lineno="1179">
<summary>
Do not audit attempts to get attribues of
all domains IPSEC key management sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_packet_sockets" lineno="1198">
<summary>
Do not audit attempts to get attribues of
all domains packet sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_raw_sockets" lineno="1217">
<summary>
Do not audit attempts to get attribues of
all domains raw sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_rw_all_key_sockets" lineno="1236">
<summary>
Do not audit attempts to read or write
all domains key sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_dgram_sockets" lineno="1255">
<summary>
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_getattr_all_stream_sockets" lineno="1274">
<summary>
Get the attributes
of all domains unix datagram sockets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_stream_sockets" lineno="1293">
<summary>
Do not audit attempts to get the attributes
of all domains unix datagram sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_connect_all_stream_sockets" lineno="1311">
<summary>
Connect to all domains unix stream sockets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_getattr_all_pipes" lineno="1340">
<summary>
Get the attributes of all domains
unnamed pipes.
</summary>
<desc>
<p>
Get the attributes of all domains
unnamed pipes.
</p>
<p>
This is commonly used for domains
that can use lsof on all domains.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_pipes" lineno="1359">
<summary>
Do not audit attempts to get the attributes
of all domains unnamed pipes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_ipsec_setcontext_all_domains" lineno="1378">
<summary>
Allow specified type to set context of all
domains IPSEC associations.
</summary>
<param name="type">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_getattr_all_entry_files" lineno="1397">
<summary>
Get the attributes of entry point
files for all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_getattr_all_entry_files" lineno="1417">
<summary>
Do not audit attempts to get the attributes
of all entry point files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_read_all_entry_files" lineno="1435">
<summary>
Read the entry point files for all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_exec_all_entry_files" lineno="1456">
<summary>
Execute the entry point files for all
domains in the caller domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_dontaudit_exec_all_entry_files" lineno="1474">
<summary>
dontaudit checking for execute on all entry point files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_manage_all_entry_files" lineno="1494">
<summary>
Create, read, write, and delete all
entrypoint files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_relabelfrom" lineno="1512">
<summary>
Relabel from domain types on files if a user managed to mislable
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_relabel_all_entry_files" lineno="1532">
<summary>
Relabel to and from all entry point
file types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_mmap_all_entry_files" lineno="1551">
<summary>
Mmap all entry point files as executable.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_entry_file_spec_domtrans" lineno="1575">
<summary>
Execute an entry_type in the specified domain.
</summary>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="domain_mmap_low" lineno="1597">
<summary>
Ability to mmap a low area of the address
space conditionally, as configured by
/proc/sys/vm/mmap_min_addr.
Preventing such mappings helps protect against
exploiting null deref bugs in the kernel.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_mmap_low_uncond" lineno="1624">
<summary>
Ability to mmap a low area of the address
space unconditionally, as configured
by /proc/sys/vm/mmap_min_addr.
Preventing such mappings helps protect against
exploiting null deref bugs in the kernel.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_all_recvfrom_all_domains" lineno="1646">
<summary>
Allow specified type to receive labeled
networking packets from all domains, over
all protocols (TCP, UDP, etc)
</summary>
<param name="type">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_unconfined_signal" lineno="1664">
<summary>
Send generic signals to the unconfined domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_named_filetrans" lineno="1682">
<summary>
Named Filetrans Domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_stub_named_filetrans_domain" lineno="1700">
<summary>
named_filetrans_domain stub attribute interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="domain_unconfined" lineno="1716">
<summary>
Unconfined access to domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_leaks" lineno="1747">
<summary>
Do not audit attempts to read or write
all leaked sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_transition_all" lineno="1765">
<summary>
Allow caller to transition to any domain
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_dontaudit_access_check" lineno="1783">
<summary>
Do not audit attempts to access check /proc
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="domain_setrlimit_all_domains" lineno="1802">
<summary>
Allow set resource limits to all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_rlimitinh_all_domains" lineno="1821">
<summary>
Allow set resource limits to all domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="domain_noatsecure_all_domains" lineno="1839">
<summary>
Allow all domains noatsecure permission
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="domain_dyntrans" lineno="1857">
<summary>
Allow domain dyntransition to all domains in domain attribute.
</summary>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
</interface>
<interface name="domain_rw_perf_event_all_domains" lineno="1875">
<summary>
Allow read and write perf_event file descriptors from all domains
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<tunable name="domain_fd_use" dftval="true">
<desc>
<p>
Allow all domains to use other domains file descriptors
</p>
</desc>
</tunable>
<tunable name="fips_mode" dftval="true">
<desc>
<p>
Allow all domains to execute in fips_mode
</p>
</desc>
</tunable>
<tunable name="domain_kernel_load_modules" dftval="false">
<desc>
<p>
Allow all domains to have the kernel load modules
</p>
</desc>
</tunable>
<tunable name="mmap_low_allowed" dftval="false">
<desc>
<p>
Control the ability to mmap a low area of the address space,
as configured by /proc/sys/vm/mmap_min_addr.
</p>
</desc>
</tunable>
<tunable name="domain_can_write_kmsg" dftval="false">
<desc>
<p>
Allow all domains write to kmsg_device,
while kernel is executed with systemd.log_target=kmsg parameter.
</p>
</desc>
</tunable>
<tunable name="domain_can_mmap_files" dftval="false">
<desc>
<p>
Allow any process to mmap any file on system with attribute file_type.
</p>
</desc>
</tunable>
</module>
<module name="files" filename="policy/modules/kernel/files.if">
<summary>
Basic filesystem types and interfaces.
</summary>
<desc>
<p>
This module contains basic filesystem types and interfaces. This
includes:
<ul>
<li>The concept of different file types including basic
files, mount points, tmp files, etc.</li>
<li>Access to groups of files and all files.</li>
<li>Types and interfaces for the basic filesystem layout
(/, /etc, /tmp, /usr, etc.).</li>
</ul>
</p>
</desc>
<required val="true">
Contains the concept of a file.
Comains the file initial SID.
</required>
<interface name="files_stub_etc" lineno="32">
<summary>
files stub etc_t interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_stub_var_lock" lineno="48">
<summary>
files stub var_lock_t interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_stub_var_log" lineno="64">
<summary>
files stub var_log_t interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_stub_var_lib" lineno="80">
<summary>
files stub var_lib_t interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_stub_var_run" lineno="96">
<summary>
files stub var_run_t interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_stub_var_spool" lineno="112">
<summary>
files stub var_run_t interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_stub_var" lineno="128">
<summary>
files stub var_run_t interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_stub_tmp" lineno="145">
<summary>
files stub tmp_t interface. No access allowed.
</summary>
<param name="domain" unused="true">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_type" lineno="210">
<summary>
Make the specified type usable for files
in a filesystem.
</summary>
<desc>
<p>
Make the specified type usable for files
in a filesystem. Types used for files that
do not use this interface, or an interface that
calls this one, will have unexpected behaviors
while the system is running. If the type is used
for device nodes (character or block files), then
the dev_node() interface is more appropriate.
</p>
<p>
Related interfaces:
</p>
<ul>
<li>application_domain()</li>
<li>application_executable_file()</li>
<li>corecmd_executable_file()</li>
<li>init_daemon_domain()</li>
<li>init_domaion()</li>
<li>init_ranged_daemon_domain()</li>
<li>init_ranged_domain()</li>
<li>init_ranged_system_domain()</li>
<li>init_script_file()</li>
<li>init_script_domain()</li>
<li>init_system_domain()</li>
<li>files_config_files()</li>
<li>files_lock_file()</li>
<li>files_mountpoint()</li>
<li>files_pid_file()</li>
<li>files_security_file()</li>
<li>files_security_mountpoint()</li>
<li>files_spool_file()</li>
<li>files_tmp_file()</li>
<li>files_tmpfs_file()</li>
<li>logging_log_file()</li>
<li>userdom_user_home_content()</li>
</ul>
<p>
Example:
</p>
<p>
type myfile_t;
files_type(myfile_t)
allow mydomain_t myfile_t:file read_file_perms;
</p>
</desc>
<param name="type">
<summary>
Type to be used for files.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="files_auth_file" lineno="230">
<summary>
Mark the specified type as a file
that is related to authentication.
</summary>
<param name="file_type">
<summary>
Type of the authentication-related
file.
</summary>
</param>
</interface>
<interface name="files_security_file" lineno="251">
<summary>
Make the specified type a file that
should not be dontaudited from
browsing from user domains.
</summary>
<param name="file_type">
<summary>
Type of the file to be used as a
member directory.
</summary>
</param>
</interface>
<interface name="files_mountpoint" lineno="271">
<summary>
Make the specified type usable for
filesystem mount points.
</summary>
<param name="type">
<summary>
Type to be used for mount points.
</summary>
</param>
</interface>
<interface name="files_mountpoint_filetrans" lineno="306">
<summary>
Create a private type object in mountpoint dir
with an automatic type transition
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="private_type">
<summary>
The type of the object to be created.
</summary>
</param>
<param name="object_class">
<summary>
The object class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_security_mountpoint" lineno="325">
<summary>
Make the specified type usable for
security file filesystem mount points.
</summary>
<param name="type">
<summary>
Type to be used for mount points.
</summary>
</param>
</interface>
<interface name="files_lock_file" lineno="345">
<summary>
Make the specified type usable for
lock files.
</summary>
<param name="type">
<summary>
Type to be used for lock files.
</summary>
</param>
</interface>
<interface name="files_pid_file" lineno="393">
<summary>
Make the specified type usable for
runtime process ID files.
</summary>
<desc>
<p>
Make the specified type usable for runtime process ID files,
typically found in /var/run.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a PID file type may result in problems with starting
or stopping services.
</p>
<p>
Related interfaces:
</p>
<ul>
<li>files_pid_filetrans()</li>
</ul>
<p>
Example usage with a domain that can create and
write its PID file with a private PID file type in the
/var/run directory:
</p>
<p>
type mypidfile_t;
files_pid_file(mypidfile_t)
allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
files_pid_filetrans(mydomain_t, mypidfile_t, file)
</p>
</desc>
<param name="type">
<summary>
Type to be used for PID files.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="files_config_file" lineno="433">
<summary>
Make the specified type a
configuration file.
</summary>
<desc>
<p>
Make the specified type usable for configuration files.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a temporary file may result in problems with
configuration management tools.
</p>
<p>
Example usage with a domain that can read
its configuration file /etc:
</p>
<p>
type myconffile_t;
files_config_file(myconffile_t)
allow mydomain_t myconffile_t:file read_file_perms;
files_search_etc(mydomain_t)
</p>
</desc>
<param name="file_type">
<summary>
Type to be used as a configuration file.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="files_poly" lineno="453">
<summary>
Make the specified type a
polyinstantiated directory.
</summary>
<param name="file_type">
<summary>
Type of the file to be used as a
polyinstantiated directory.
</summary>
</param>
</interface>
<interface name="files_poly_parent" lineno="474">
<summary>
Make the specified type a parent
of a polyinstantiated directory.
</summary>
<param name="file_type">
<summary>
Type of the file to be used as a
parent directory.
</summary>
</param>
</interface>
<interface name="files_poly_member" lineno="495">
<summary>
Make the specified type a
polyinstantiation member directory.
</summary>
<param name="file_type">
<summary>
Type of the file to be used as a
member directory.
</summary>
</param>
</interface>
<interface name="files_poly_member_tmp" lineno="522">
<summary>
Make the domain use the specified
type of polyinstantiated directory.
</summary>
<param name="domain">
<summary>
Domain using the polyinstantiated
directory.
</summary>
</param>
<param name="file_type">
<summary>
Type of the file to be used as a
member directory.
</summary>
</param>
</interface>
<interface name="files_tmp_file" lineno="569">
<summary>
Make the specified type a file
used for temporary files.
</summary>
<desc>
<p>
Make the specified type usable for temporary files.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a temporary file may result in problems with
purging temporary files.
</p>
<p>
Related interfaces:
</p>
<ul>
<li>files_tmp_filetrans()</li>
</ul>
<p>
Example usage with a domain that can create and
write its temporary file in the system temporary file
directories (/tmp or /var/tmp):
</p>
<p>
type mytmpfile_t;
files_tmp_file(mytmpfile_t)
allow mydomain_t mytmpfile_t:file { create_file_perms write_file_perms };
files_tmp_filetrans(mydomain_t, mytmpfile_t, file)
</p>
</desc>
<param name="file_type">
<summary>
Type of the file to be used as a
temporary file.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="files_tmpfs_file" lineno="591">
<summary>
Transform the type into a file, for use on a
virtual memory filesystem (tmpfs).
</summary>
<param name="type">
<summary>
The type to be transformed.
</summary>
</param>
</interface>
<interface name="files_getattr_all_dirs" lineno="610">
<summary>
Get the attributes of all directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_all_dirs" lineno="629">
<summary>
Do not audit attempts to get the attributes
of all directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_getattr_non_security_dirs" lineno="647">
<summary>
Get attributes of all non-security directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_non_security" lineno="665">
<summary>
List all non-security directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_non_security_dirs" lineno="683">
<summary>
Watch all non-security directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_non_security_files" lineno="701">
<summary>
Watch all non-security files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_non_security_lnk_files" lineno="719">
<summary>
Watch all non-security lnk_files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_list_non_security" lineno="738">
<summary>
Do not audit attempts to list all
non-security directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_mounton_non_security" lineno="757">
<summary>
Mount a filesystem on all non-security
directories and files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_write_non_security_dirs" lineno="776">
<summary>
Allow attempts to modify any directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_setattr_non_security_dirs" lineno="794">
<summary>
Allow attempts to setattr any directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_non_security_dirs" lineno="812">
<summary>
Allow attempts to create non-security directories
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_non_security_dirs" lineno="830">
<summary>
Allow attempts to manage non-security directories
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_search_non_security_dirs" lineno="848">
<summary>
Allow attempts to search non-security directories
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_all_files" lineno="866">
<summary>
Get the attributes of all files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_all_chr_files" lineno="885">
<summary>
Get the attributes of all chr files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_all_blk_files" lineno="903">
<summary>
Get the attributes of all blk files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_all_files" lineno="922">
<summary>
Do not audit attempts to get the attributes
of all files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_non_security_files" lineno="941">
<summary>
Do not audit attempts to get the attributes
of non security files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_proc_type_files" lineno="960">
<summary>
Do not audit attempts to get the attributes
of proc_type files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_sysctl_type_files" lineno="979">
<summary>
Do not audit attempts to get the attributes
of sysctl_type files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_filesystem_type_files" lineno="998">
<summary>
Do not audit attempts to get the attributes
of filesystem_type files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_non_security_dirs" lineno="1017">
<summary>
Do not audit attempts to search
non security dirs.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_setattr_non_security_files" lineno="1036">
<summary>
Do not audit attempts to set the attributes
of non security files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_setattr_non_security_dirs" lineno="1055">
<summary>
Do not audit attempts to set the attributes
of non security directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_read_all_files" lineno="1073">
<summary>
Read all files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mmap_all_files" lineno="1096">
<summary>
Mmap all files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_execmod_all_files" lineno="1123">
<summary>
Allow shared library text relocations in all files.
</summary>
<desc>
<p>
Allow shared library text relocations in all files.
</p>
<p>
This is added to support WINE policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_non_security_files" lineno="1142">
<summary>
Read all non-security files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_map_non_security_files" lineno="1163">
<summary>
Map all non-security files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_rw_inherited_non_security_files" lineno="1182">
<summary>
Read/Write all inherited non-security files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_append_non_security_files" lineno="1201">
<summary>
Allow Append to non-security files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_manage_non_security_files" lineno="1220">
<summary>
Manage all non-security files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_relabel_non_security_files" lineno="1240">
<summary>
Relabel all non-security files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_search_base_file_types" lineno="1269">
<summary>
Search all base file dirs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_base_file_types" lineno="1287">
<summary>
Relabel all base file types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_all_dirs_except" lineno="1319">
<summary>
Read all directories on the filesystem, except
the listed exceptions.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="exception_types" optional="true">
<summary>
The types to be excluded. Each type or attribute
must be negated by the caller.
</summary>
</param>
</interface>
<interface name="files_read_all_files_except" lineno="1344">
<summary>
Read all files on the filesystem, except
the listed exceptions.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="exception_types" optional="true">
<summary>
The types to be excluded. Each type or attribute
must be negated by the caller.
</summary>
</param>
</interface>
<interface name="files_read_all_symlinks_except" lineno="1369">
<summary>
Read all symbolic links on the filesystem, except
the listed exceptions.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="exception_types" optional="true">
<summary>
The types to be excluded. Each type or attribute
must be negated by the caller.
</summary>
</param>
</interface>
<interface name="files_getattr_all_symlinks" lineno="1387">
<summary>
Get the attributes of all symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_all_symlinks" lineno="1406">
<summary>
Do not audit attempts to get the attributes
of all symbolic links.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_read_all_symlinks" lineno="1424">
<summary>
Do not audit attempts to read all symbolic links.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_non_security_symlinks" lineno="1443">
<summary>
Do not audit attempts to get the attributes
of non security symbolic links.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_non_security_blk_files" lineno="1462">
<summary>
Do not audit attempts to get the attributes
of non security block devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_non_security_chr_files" lineno="1481">
<summary>
Do not audit attempts to get the attributes
of non security character devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_read_all_symlinks" lineno="1500">
<summary>
Read all symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_getattr_all_pipes" lineno="1519">
<summary>
Get the attributes of all named pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_all_pipes" lineno="1539">
<summary>
Do not audit attempts to get the attributes
of all named pipes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_non_security_pipes" lineno="1558">
<summary>
Do not audit attempts to get the attributes
of non security named pipes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_rw_inherited_pipes" lineno="1577">
<summary>
Do not audit attempts to read/write
of non security named pipes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_getattr_all_sockets" lineno="1595">
<summary>
Get the attributes of all named sockets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_all_sockets" lineno="1615">
<summary>
Do not audit attempts to get the attributes
of all named sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_read_all_sockets" lineno="1634">
<summary>
Do not audit attempts to read
of all named sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_read_all_non_security_files" lineno="1653">
<summary>
Do not audit attempts to read
of all security file types.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_non_security_sockets" lineno="1672">
<summary>
Do not audit attempts to get the attributes
of non security named sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_read_all_blk_files" lineno="1690">
<summary>
Read all block nodes with file types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_all_chr_files" lineno="1708">
<summary>
Read all character nodes with file types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_all_files" lineno="1734">
<summary>
Relabel all files on the filesystem, except
the listed exceptions.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="exception_types" optional="true">
<summary>
The types to be excluded. Each type or attribute
must be negated by the caller.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_rw_all_files" lineno="1771">
<summary>
rw all files on the filesystem, except
the listed exceptions.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="exception_types" optional="true">
<summary>
The types to be excluded. Each type or attribute
must be negated by the caller.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_manage_all_files" lineno="1797">
<summary>
Manage all files on the filesystem, except
the listed exceptions.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="exception_types" optional="true">
<summary>
The types to be excluded. Each type or attribute
must be negated by the caller.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_search_all" lineno="1826">
<summary>
Search the contents of all directories on
extended attribute filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_all" lineno="1845">
<summary>
List the contents of all directories on
extended attribute filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_all_dirs" lineno="1865">
<summary>
Do not audit attempts to search the
contents of any directories on extended
attribute filesystems.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_map_all_dirs" lineno="1884">
<summary>
Do not audit attempts to map
file_type directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_getattr_all_file_type_fs" lineno="1907">
<summary>
Get the attributes of all filesystems
with the type of a file.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelto_all_file_type_fs" lineno="1925">
<summary>
Relabel a filesystem to the type of a file.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_all_file_type_fs" lineno="1943">
<summary>
Relabel a filesystem to the type of a file.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mount_all_file_type_fs" lineno="1961">
<summary>
Mount all filesystems with the type of a file.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_unmount_all_file_type_fs" lineno="1979">
<summary>
Unmount all filesystems with the type of a file.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_remount_all_file_type_fs" lineno="1997">
<summary>
Remount all filesystems with the type of a file.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_non_auth_dirs" lineno="2016">
<summary>
Get attributes of all non-authentication related
directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_non_auth_dirs" lineno="2035">
<summary>
Read all non-authentication related
directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_non_auth_dirs" lineno="2053">
<summary>
Watch non-authentication related directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_non_auth_files" lineno="2072">
<summary>
Read all non-authentication related
files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_non_auth_symlinks" lineno="2091">
<summary>
Read all non-authentication related
symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_non_auth_files" lineno="2109">
<summary>
rw non-authentication related files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_non_auth_files" lineno="2129">
<summary>
Manage non-authentication related
files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_relabel_non_auth_files" lineno="2157">
<summary>
Relabel all non-authentication related
files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_manage_config_dirs" lineno="2188">
<summary>
Manage all configuration directories on filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_config_dirs" lineno="2207">
<summary>
Relabel configuration directories
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_config_files" lineno="2225">
<summary>
Read config files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_config_files" lineno="2246">
<summary>
Manage all configuration files on filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_config_files" lineno="2265">
<summary>
Relabel configuration files
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mounton_all_mountpoints" lineno="2283">
<summary>
Mount a filesystem on all mount points.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_all_mountpoints" lineno="2302">
<summary>
Get the attributes of all mount points.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_setattr_all_mountpoints" lineno="2320">
<summary>
Set the attributes of all mount points.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelto_all_mountpoints" lineno="2338">
<summary>
Set the attributes of all mount points.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_setattr_all_mountpoints" lineno="2356">
<summary>
Do not audit attempts to set the attributes on all mount points.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_search_all_mountpoints" lineno="2374">
<summary>
Search all mount points.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_all_mountpoints" lineno="2392">
<summary>
Do not audit searching of all mount points.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_list_all_mountpoints" lineno="2410">
<summary>
List all mount points.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_list_all_mountpoints" lineno="2428">
<summary>
Do not audit listing of all mount points.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_write_all_mountpoints" lineno="2446">
<summary>
Write all mount points.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_all_mountpoints" lineno="2464">
<summary>
Do not audit attempts to write to mount points.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_watch_sb_all_mountpoints" lineno="2483">
<summary>
Watch_sb all mount points
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_unmount_all_mountpoints" lineno="2501">
<summary>
Do not audit attempts to unmount all mount points.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_read_all_mountpoint_symlinks" lineno="2519">
<summary>
Read all mountpoint symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_entrypoint_all_mountpoint" lineno="2538">
<summary>
Make all mountpoint as entrypoint.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rmdir_all_dirs" lineno="2556">
<summary>
Remove all file type directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_sb_all_dirs" lineno="2574">
<summary>
Watch_sb all file type directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_write_all_dirs" lineno="2592">
<summary>
Write all file type directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_root" lineno="2610">
<summary>
List the contents of the root directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_write_root_dirs" lineno="2628">
<summary>
Do not audit attempts to write to / dirs.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_watch_sb_root_dirs" lineno="2646">
<summary>
Watch_sb root directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_root_dirs" lineno="2664">
<summary>
Do not audit attempts to write to / dirs.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_rw_root_dir" lineno="2683">
<summary>
Do not audit attempts to write
files in the root directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_access_check_root" lineno="2702">
<summary>
Do not audit attempts to check the
access on root directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_root_filetrans" lineno="2737">
<summary>
Create an object in the root directory, with a private
type using a type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="private type">
<summary>
The type of the object to be created.
</summary>
</param>
<param name="object">
<summary>
The object class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_read_root_files" lineno="2755">
<summary>
Read files in the root directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_read_root_files" lineno="2774">
<summary>
Do not audit attempts to read files in
the root directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_rw_root_files" lineno="2793">
<summary>
Do not audit attempts to read or write
files in the root directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_rw_root_chr_files" lineno="2812">
<summary>
Do not audit attempts to read or write
character device nodes in the root directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_delete_root_files" lineno="2830">
<summary>
Delete files in the root directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_root_dir_entry" lineno="2848">
<summary>
Remove entries from the root directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_setattr_root_dirs" lineno="2866">
<summary>
Set attributes of the root directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_root_dirs" lineno="2884">
<summary>
Watch the root directory.
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_watch_mount_root_dirs" lineno="2902">
<summary>
Watch_mount the root directory.
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_watch_with_perm_root_dirs" lineno="2920">
<summary>
Watch_with_perm the root directory.
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_relabel_rootfs" lineno="2938">
<summary>
Relabel a rootfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_unmount_rootfs" lineno="2956">
<summary>
Unmount a rootfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mounton_rootfs" lineno="2974">
<summary>
Mount a filesystem on the root file system
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_remount_rootfs" lineno="2992">
<summary>
Remount a filesystem on the root file system
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_mounton_rootfs" lineno="3010">
<summary>
Mount a filesystem on the root file system
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_boot_dirs" lineno="3028">
<summary>
Get attributes of the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_boot_dirs" lineno="3047">
<summary>
Do not audit attempts to get attributes
of the /boot directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_search_boot" lineno="3065">
<summary>
Search the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_boot" lineno="3083">
<summary>
Do not audit attempts to search the /boot directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_list_boot" lineno="3101">
<summary>
List the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_list_boot" lineno="3119">
<summary>
Do not audit attempts to list the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_boot_dirs" lineno="3137">
<summary>
Create directories in /boot
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_boot_dirs" lineno="3156">
<summary>
Create, read, write, and delete
directories in /boot.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_manage_boot_dirs" lineno="3175">
<summary>
Do not audit attempts to manage entries
in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_watch_boot_dirs" lineno="3193">
<summary>
Watch directories in /boot.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_sb_boot_dirs" lineno="3211">
<summary>
Watch_sb boot directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_mount_boot_dirs" lineno="3229">
<summary>
Watch_mount directories in /boot.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_with_perm_boot_dirs" lineno="3247">
<summary>
Watch_with_perm directories in /boot.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_boot_filetrans" lineno="3281">
<summary>
Create a private type object in boot
with an automatic type transition
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="private_type">
<summary>
The type of the object to be created.
</summary>
</param>
<param name="object_class">
<summary>
The object class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_read_boot_files" lineno="3300">
<summary>
read files in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_map_boot_files" lineno="3318">
<summary>
Map files in the /boot.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_boot_files" lineno="3337">
<summary>
Create, read, write, and delete files
in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_dontaudit_manage_boot_files" lineno="3357">
<summary>
Dontaudit Create, read, write, and delete files
in the boot files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_relabelfrom_boot_files" lineno="3375">
<summary>
Relabel from files in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelto_boot_files" lineno="3393">
<summary>
Relabel to files in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_boot_symlinks" lineno="3411">
<summary>
Read symbolic links in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_boot_symlinks" lineno="3430">
<summary>
Read and write symbolic links
in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_boot_symlinks" lineno="3450">
<summary>
Create, read, write, and delete symbolic links
in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_kernel_img" lineno="3468">
<summary>
Read kernel files in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_kernel_img" lineno="3489">
<summary>
Install a kernel into the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_delete_kernel" lineno="3509">
<summary>
Delete a kernel from /boot.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_getattr_default_dirs" lineno="3527">
<summary>
Getattr of directories with the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_default_dirs" lineno="3546">
<summary>
Do not audit attempts to get the attributes of
directories with the default file type.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_search_default" lineno="3564">
<summary>
Search the contents of directories with the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_default" lineno="3582">
<summary>
List contents of directories with the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_list_default" lineno="3601">
<summary>
Do not audit attempts to list contents of
directories with the default file type.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_manage_default_dirs" lineno="3620">
<summary>
Create, read, write, and delete directories with
the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mounton_default" lineno="3638">
<summary>
Mount a filesystem on a directory with the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_default_files" lineno="3657">
<summary>
Do not audit attempts to get the attributes of
files with the default file type.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_read_default_files" lineno="3675">
<summary>
Read files with the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_read_default_files" lineno="3694">
<summary>
Do not audit attempts to read files
with the default file type.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_manage_default_files" lineno="3713">
<summary>
Create, read, write, and delete files with
the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_default_symlinks" lineno="3731">
<summary>
Read symbolic links with the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_default_sockets" lineno="3749">
<summary>
Read sockets with the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_default_pipes" lineno="3767">
<summary>
Read named pipes with the default file type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mounton_etc" lineno="3785">
<summary>
Mounton directories on filesystem /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_search_etc" lineno="3803">
<summary>
Search the contents of /etc directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_setattr_etc_dirs" lineno="3821">
<summary>
Set the attributes of the /etc directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_etc" lineno="3839">
<summary>
List the contents of /etc directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_etc_dirs" lineno="3857">
<summary>
Do not audit attempts to write to /etc dirs.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_rw_etc_dirs" lineno="3875">
<summary>
Add and remove entries from /etc directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_remove_etc_dir" lineno="3893">
<summary>
Dontaudit remove dir /etc directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_manage_etc_dirs" lineno="3912">
<summary>
Manage generic directories in /etc
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_read_etc_files" lineno="3964">
<summary>
Read generic files in /etc.
</summary>
<desc>
<p>
Allow the specified domain to read generic
files in /etc. These files are typically
general system configuration files that do
not have more specific SELinux types. Some
examples of these files are:
</p>
<ul>
<li>/etc/fstab</li>
<li>/etc/passwd</li>
<li>/etc/services</li>
<li>/etc/shells</li>
</ul>
<p>
This interface does not include access to /etc/shadow.
</p>
<p>
Generally, it is safe for many domains to have
this access. However, since this interface provides
access to the /etc/passwd file, caution must be
exercised, as user account names can be leaked
through this access.
</p>
<p>
Related interfaces:
</p>
<ul>
<li>auth_read_shadow()</li>
<li>files_read_etc_runtime_files()</li>
<li>seutil_read_config()</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="files_map_etc_files" lineno="3985">
<summary>
Map generic files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_etc_files" lineno="4003">
<summary>
Do not audit attempts to write generic files in /etc.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_rw_etc_files" lineno="4022">
<summary>
Read and write generic files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_create_etc_files" lineno="4042">
<summary>
Create generic files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_map_read_etc_files" lineno="4060">
<summary>
Map and read generic files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_etc_files" lineno="4080">
<summary>
Create, read, write, and delete generic
files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_dontaudit_access_check_etc" lineno="4100">
<summary>
Do not audit attempts to check the
access on etc files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_delete_etc_files" lineno="4118">
<summary>
Delete system configuration files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_etc_dir_entry" lineno="4136">
<summary>
Remove entries from the etc directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_exec_etc_files" lineno="4154">
<summary>
Execute generic files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_etc_files" lineno="4174">
<summary>
Relabel from and to generic files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_etc_symlinks" lineno="4193">
<summary>
Read symbolic links in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_etc_symlinks" lineno="4211">
<summary>
Create, read, write, and delete symbolic links in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_etc_filetrans" lineno="4245">
<summary>
Create objects in /etc with a private
type using a type_transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="file_type">
<summary>
Private file type.
</summary>
</param>
<param name="class">
<summary>
Object classes to be created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_watch_etc_dirs" lineno="4263">
<summary>
Watch generic directories in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_watch_etc_files" lineno="4281">
<summary>
Watch generic files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_create_boot_flag" lineno="4311">
<summary>
Create a boot flag.
</summary>
<desc>
<p>
Create a boot flag, such as
/.autorelabel and /.autofsck.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_delete_boot_flag" lineno="4337">
<summary>
Delete a boot flag.
</summary>
<desc>
<p>
Delete a boot flag, such as
/.autorelabel and /.autofsck.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_read_etc_runtime_files" lineno="4375">
<summary>
Read files in /etc that are dynamically
created on boot, such as mtab.
</summary>
<desc>
<p>
Allow the specified domain to read dynamically created
configuration files in /etc. These files are typically
general system configuration files that do
not have more specific SELinux types. Some
examples of these files are:
</p>
<ul>
<li>/etc/motd</li>
<li>/etc/mtab</li>
<li>/etc/nologin</li>
</ul>
<p>
This interface does not include access to /etc/shadow.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10" />
<rolecap/>
</interface>
<interface name="files_dontaudit_setattr_etc_runtime_files" lineno="4395">
<summary>
Do not audit attempts to set the attributes of the etc_runtime files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_etc_runtime_files" lineno="4413">
<summary>
Do not audit attempts to write etc_runtime files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_read_etc_runtime_files" lineno="4433">
<summary>
Do not audit attempts to read files
in /etc that are dynamically
created on boot, such as mtab.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_rw_etc_runtime_files" lineno="4453">
<summary>
Read and write files in /etc that are dynamically
created on boot, such as mtab.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_manage_etc_runtime_files" lineno="4476">
<summary>
Create, read, write, and delete files in
/etc that are dynamically created on boot,
such as mtab.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_etc_filetrans_etc_runtime" lineno="4507">
<summary>
Create, etc runtime objects with an automatic
type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="object">
<summary>
The class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_getattr_isid_type_dirs" lineno="4526">
<summary>
Getattr of directories on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_isid_type" lineno="4545">
<summary>
Getattr all file opbjects on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_setattr_isid_type_dirs" lineno="4564">
<summary>
Setattr of directories on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_isid_type_dirs" lineno="4583">
<summary>
Do not audit attempts to search directories on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_list_isid_type_dirs" lineno="4602">
<summary>
List the contents of directories on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_isid_type_dirs" lineno="4621">
<summary>
Read and write directories on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_isid_type_dirs" lineno="4640">
<summary>
Delete directories on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_exec_isid_files" lineno="4658">
<summary>
Execute files on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mounton_isid" lineno="4677">
<summary>
Moundon directories on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelfrom_isid_type" lineno="4696">
<summary>
Relabelfrom all file opbjects on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_isid_type_dirs" lineno="4715">
<summary>
Create, read, write, and delete directories
on new filesystems that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mounton_isid_type_dirs" lineno="4734">
<summary>
Mount a filesystem on a directory on new filesystems
that has not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mounton_isid_type_chr_file" lineno="4753">
<summary>
Mount a filesystem on a new chr_file
that has not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_isid_type_files" lineno="4772">
<summary>
Read files on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_isid_type_files" lineno="4791">
<summary>
Delete files on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_isid_type_symlinks" lineno="4810">
<summary>
Delete symbolic links on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_isid_type_fifo_files" lineno="4829">
<summary>
Delete named pipes on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_isid_type_sock_files" lineno="4848">
<summary>
Delete named sockets on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_isid_type_blk_files" lineno="4867">
<summary>
Delete block files on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_isid_chr_files" lineno="4886">
<summary>
Do not audit attempts to write to character
files that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_delete_isid_type_chr_files" lineno="4905">
<summary>
Delete chr files on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_isid_type_files" lineno="4924">
<summary>
Create, read, write, and delete files
on new filesystems that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_isid_type_symlinks" lineno="4943">
<summary>
Create, read, write, and delete symbolic links
on new filesystems that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_isid_type_blk_files" lineno="4962">
<summary>
Read and write block device nodes on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_inherited_isid_type_files" lineno="4981">
<summary>
rw any files inherited from another process
on new filesystems that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_isid_type_blk_files" lineno="5000">
<summary>
Create, read, write, and delete block device nodes
on new filesystems that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_isid_type_chr_files" lineno="5019">
<summary>
Create, read, write, and delete character device nodes
on new filesystems that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_mounton_isid" lineno="5038">
<summary>
Dontaudit Moundon directories on new filesystems
that have not yet been labeled.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_home_dir" lineno="5057">
<summary>
Get the attributes of the home directories root
(/home).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_home_dir" lineno="5078">
<summary>
Do not audit attempts to get the
attributes of the home directories root
(/home).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_access_check_home_dir" lineno="5098">
<summary>
Do not audit attempts to check the
access on home root directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_create_home_dir" lineno="5116">
<summary>
Create /home directories
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_search_home" lineno="5134">
<summary>
Search home directories root (/home).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_home" lineno="5154">
<summary>
Do not audit attempts to search
home directories root (/home).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_list_home" lineno="5174">
<summary>
Do not audit attempts to list
home directories root (/home).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_list_home" lineno="5193">
<summary>
Get listing of home directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_home" lineno="5212">
<summary>
Watch home directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_mount_home" lineno="5230">
<summary>
Watch_mount home directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_with_perm_home" lineno="5248">
<summary>
Watch_with_perm home directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelto_home" lineno="5266">
<summary>
Relabel to user home root (/home).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_home_filetrans" lineno="5299">
<summary>
Create objects in /home.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="home_type">
<summary>
The private type.
</summary>
</param>
<param name="object">
<summary>
The class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_getattr_lost_found_dirs" lineno="5317">
<summary>
Get the attributes of lost+found directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_lost_found_dirs" lineno="5336">
<summary>
Do not audit attempts to get the attributes of
lost+found directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_list_lost_found" lineno="5354">
<summary>
List the contents of lost+found directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_lost_found" lineno="5374">
<summary>
Create, read, write, and delete objects in
lost+found directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_search_mnt" lineno="5396">
<summary>
Search the contents of /mnt.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_mnt" lineno="5414">
<summary>
Do not audit attempts to search /mnt.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_list_mnt" lineno="5432">
<summary>
List the contents of /mnt.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_list_mnt" lineno="5450">
<summary>
dontaudit List the contents of /mnt.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_access_check_mnt" lineno="5469">
<summary>
Do not audit attempts to check the
write access on mnt files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_mounton_mnt" lineno="5486">
<summary>
Mount a filesystem on /mnt.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_mnt_dirs" lineno="5505">
<summary>
Create, read, write, and delete directories in /mnt.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_manage_mnt_files" lineno="5523">
<summary>
Create, read, write, and delete files in /mnt.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_mnt_files" lineno="5541">
<summary>
read files in /mnt.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_mnt_symlinks" lineno="5559">
<summary>
Read symbolic links in /mnt.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_load_kernel_modules" lineno="5578">
<summary>
Load kernel module files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_map_kernel_modules" lineno="5597">
<summary>
Mmap kernel module files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_mnt_symlinks" lineno="5616">
<summary>
Create, read, write, and delete symbolic links in /mnt.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_search_kernel_modules" lineno="5634">
<summary>
Search the contents of the kernel module directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_kernel_modules" lineno="5653">
<summary>
List the contents of the kernel module directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_kernel_modules" lineno="5671">
<summary>
Get the attributes of kernel module files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_kernel_modules" lineno="5689">
<summary>
Read kernel module files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_write_kernel_modules" lineno="5710">
<summary>
Write kernel module files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_kernel_modules" lineno="5729">
<summary>
Delete kernel module files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_kernel_modules" lineno="5749">
<summary>
Create, read, write, and delete
kernel module files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_relabel_kernel_modules" lineno="5767">
<summary>
Relabel from and to kernel module files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_kernel_modules_filetrans" lineno="5802">
<summary>
Create objects in the kernel module directories
with a private type via an automatic type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="private_type">
<summary>
The type of the object to be created.
</summary>
</param>
<param name="object_class">
<summary>
The object class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_list_world_readable" lineno="5821">
<summary>
List world-readable directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_read_world_readable_files" lineno="5840">
<summary>
Read world-readable files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_read_world_readable_symlinks" lineno="5859">
<summary>
Read world-readable symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_read_world_readable_pipes" lineno="5877">
<summary>
Read world-readable named pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_world_readable_sockets" lineno="5895">
<summary>
Read world-readable sockets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_system_conf_files" lineno="5913">
<summary>
Read manageable system configuration files in /etc
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_system_conf_dirs" lineno="5933">
<summary>
Watch manageable system configuration dirs in /etc
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_system_conf_files" lineno="5952">
<summary>
Manage manageable system configuration files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_filetrans_system_conf_named_files" lineno="5971">
<summary>
File name transition for system configuration files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelto_system_conf_files" lineno="6009">
<summary>
Relabel manageable system configuration files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelfrom_system_conf_files" lineno="6027">
<summary>
Relabel manageable system configuration files in /etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_etc_filetrans_system_conf" lineno="6046">
<summary>
Create files in /etc with the type used for
the manageable system config files.
</summary>
<param name="domain">
<summary>
The type of the process performing this action.
</summary>
</param>
</interface>
<interface name="files_manage_system_db_files" lineno="6064">
<summary>
Manage manageable system db files in /var/lib.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_system_db_dirs" lineno="6083">
<summary>
Watch manageable system db dirs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_system_db_files" lineno="6101">
<summary>
Watch manageable system db files in /var/db.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_map_system_db_files" lineno="6119">
<summary>
Map manageable system db files in /var/lib.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_filetrans_system_db_named_files" lineno="6136">
<summary>
File name transition for system db files in /var/lib.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_filetrans_tmp_named_files" lineno="6155">
<summary>
File name transition for tmp files in /.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_associate_tmp" lineno="6176">
<summary>
Allow the specified type to associate
to a filesystem with the type of the
temporary directory (/tmp).
</summary>
<param name="file_type">
<summary>
Type of the file to associate.
</summary>
</param>
</interface>
<interface name="files_associate_rootfs" lineno="6196">
<summary>
Allow the specified type to associate
to a filesystem with the type of the
/ file system
</summary>
<param name="file_type">
<summary>
Type of the file to associate.
</summary>
</param>
</interface>
<interface name="files_getattr_tmp_dirs" lineno="6214">
<summary>
Get the attributes of the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_access_check_tmp" lineno="6234">
<summary>
Do not audit attempts to check the
access on tmp files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_tmp_dirs" lineno="6253">
<summary>
Do not audit attempts to get the
attributes of the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_search_tmp" lineno="6271">
<summary>
Search the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_tmp" lineno="6291">
<summary>
Do not audit attempts to search the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_list_tmp" lineno="6309">
<summary>
Read the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_list_tmp" lineno="6328">
<summary>
Do not audit listing of the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_rw_generic_tmp_dir" lineno="6346">
<summary>
Allow read and write to the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain not to audit.
</summary>
</param>
</interface>
<interface name="files_delete_tmp_files" lineno="6365">
<summary>
Delete generic tmp files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_tmp_sockets" lineno="6383">
<summary>
Delete generic tmp sock files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_tmp_pipes" lineno="6401">
<summary>
Delete generic tmp named pipes
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_tmp_dir_entry" lineno="6419">
<summary>
Remove entries from the tmp directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_generic_tmp_files" lineno="6438">
<summary>
Read files in the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_write_generic_tmp_sock_files" lineno="6456">
<summary>
Write socket files in the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_generic_tmp_dirs" lineno="6474">
<summary>
Manage temporary directories in /tmp.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_generic_tmp_dirs" lineno="6492">
<summary>
Watch generic directories in /tmp
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_watch_mount_generic_tmp_dirs" lineno="6510">
<summary>
Watch_mount generic directories in /tmp
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_watch_with_perm_generic_tmp_dirs" lineno="6528">
<summary>
Watch_with_perm generic directories in /tmp
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_execmod_tmp" lineno="6554">
<summary>
Allow shared library text relocations in tmp files.
</summary>
<desc>
<p>
Allow shared library text relocations in tmp files.
</p>
<p>
This is added to support java policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_generic_tmp_files" lineno="6572">
<summary>
Manage temporary files and directories in /tmp.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_map_generic_tmp_files" lineno="6591">
<summary>
Mmap temporary files
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolebase/>
</interface>
<interface name="files_read_generic_tmp_symlinks" lineno="6609">
<summary>
Read symbolic links in the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_generic_tmp_sockets" lineno="6627">
<summary>
Read and write generic named sockets in the tmp directory (/tmp).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelfrom_tmp_dirs" lineno="6645">
<summary>
Relabel a dir from the type used in /tmp.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelfrom_tmp_files" lineno="6663">
<summary>
Relabel a file from the type used in /tmp.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_setattr_all_tmp_dirs" lineno="6681">
<summary>
Set the attributes of all tmp directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_inherited_tmp_files" lineno="6699">
<summary>
Allow caller to read inherited tmp files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_append_inherited_tmp_files" lineno="6717">
<summary>
Allow caller to append inherited tmp files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_inherited_tmp_file" lineno="6735">
<summary>
Allow caller to read and write inherited tmp files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_all_tmp" lineno="6753">
<summary>
List all tmp directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_all_tmp_dirs" lineno="6773">
<summary>
Relabel to and from all temporary
directory types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_dontaudit_getattr_all_tmp_files" lineno="6794">
<summary>
Do not audit attempts to get the attributes
of all tmp files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_getattr_all_tmp_files" lineno="6813">
<summary>
Allow attempts to get the attributes
of all tmp files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_all_tmp_files" lineno="6833">
<summary>
Relabel to and from all temporary
file types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_dontaudit_getattr_all_tmp_sockets" lineno="6854">
<summary>
Do not audit attempts to get the attributes
of all tmp sock_file.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_read_all_tmp_files" lineno="6872">
<summary>
Read all tmp files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_tmp_file_leaks" lineno="6891">
<summary>
Do not audit attempts to read or write
all leaked tmpfiles files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_rw_tmp_file_leaks" lineno="6910">
<summary>
Do allow attempts to read or write
all leaked tmpfiles files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_tmp_filetrans" lineno="6944">
<summary>
Create an object in the tmp directories, with a private
type using a type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="private type">
<summary>
The type of the object to be created.
</summary>
</param>
<param name="object">
<summary>
The object class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_purge_tmp" lineno="6962">
<summary>
Delete the contents of /tmp.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_setattr_usr_dirs" lineno="6995">
<summary>
Set the attributes of the /usr directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_search_usr" lineno="7013">
<summary>
Search the content of /usr.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_usr" lineno="7032">
<summary>
List the contents of generic
directories in /usr.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_usr_dirs" lineno="7050">
<summary>
Do not audit write of /usr dirs
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_rw_usr_dirs" lineno="7068">
<summary>
Add and remove entries from /usr directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_rw_usr_dirs" lineno="7087">
<summary>
Do not audit attempts to add and remove
entries from /usr directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_delete_usr_dirs" lineno="7105">
<summary>
Delete generic directories in /usr in the caller domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_usr_dirs" lineno="7123">
<summary>
Manage generic directories in /usr in the caller domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_usr_files" lineno="7141">
<summary>
Delete generic files in /usr in the caller domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mmap_usr_files" lineno="7159">
<summary>
Map files in /usr in the caller domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_usr_files" lineno="7177">
<summary>
Get the attributes of files in /usr.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_usr_files" lineno="7213">
<summary>
Read generic files in /usr.
</summary>
<desc>
<p>
Allow the specified domain to read generic
files in /usr. These files are various program
files that do not have more specific SELinux types.
Some examples of these files are:
</p>
<ul>
<li>/usr/include/*</li>
<li>/usr/share/doc/*</li>
<li>/usr/share/info/*</li>
</ul>
<p>
Generally, it is safe for many domains to have
this access.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="files_exec_usr_files" lineno="7233">
<summary>
Execute generic programs in /usr in the caller domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_usr_files" lineno="7253">
<summary>
dontaudit write of /usr files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_manage_usr_files" lineno="7271">
<summary>
Create, read, write, and delete files in the /usr directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelto_usr_files" lineno="7289">
<summary>
Relabel a file to the type used in /usr.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelfrom_usr_files" lineno="7307">
<summary>
Relabel a file from the type used in /usr.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_usr_symlinks" lineno="7325">
<summary>
Read symbolic links in /usr.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_usr_filetrans" lineno="7358">
<summary>
Create objects in the /usr directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="file_type">
<summary>
The type of the object to be created
</summary>
</param>
<param name="object_class">
<summary>
The object class.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_src" lineno="7376">
<summary>
Do not audit attempts to search /usr/src.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_getattr_usr_src_files" lineno="7394">
<summary>
Get the attributes of files in /usr/src.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_usr_src_files" lineno="7415">
<summary>
Read files in /usr/src.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_exec_usr_src_files" lineno="7436">
<summary>
Execute programs in /usr/src in the caller domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_usr_dirs" lineno="7456">
<summary>
Watch generic directories in /usr.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_usr_files" lineno="7474">
<summary>
Watch generic files in /usr.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_kernel_symbol_table" lineno="7492">
<summary>
Install a system.map into the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_kernel_symbol_table" lineno="7511">
<summary>
Dontaudit getattr attempts on the system.map file
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_read_kernel_symbol_table" lineno="7529">
<summary>
Read system.map in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_kernel_symbol_table" lineno="7548">
<summary>
Delete a system.map in the /boot directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mounton_kernel_symbol_table" lineno="7568">
<summary>
Mounton system_map directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_search_var" lineno="7587">
<summary>
Search the contents of /var.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_var_dirs" lineno="7605">
<summary>
Do not audit attempts to write to /var.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_write_var_dirs" lineno="7623">
<summary>
Allow attempts to write to /var.dirs
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_setattr_var_dirs" lineno="7641">
<summary>
Set the attributes of the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_var" lineno="7660">
<summary>
Do not audit attempts to search
the contents of /var.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_list_var" lineno="7678">
<summary>
List the contents of /var.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_list_var" lineno="7696">
<summary>
Do not audit listing of the var directory (/var).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_create_var_dirs" lineno="7715">
<summary>
Create directories
in the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_var_dirs" lineno="7734">
<summary>
Create, read, write, and delete directories
in the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_var_dirs" lineno="7752">
<summary>
Watch generic directories in /var.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_var_files" lineno="7770">
<summary>
Read files in the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_append_var_files" lineno="7788">
<summary>
Append files in the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_var_files" lineno="7806">
<summary>
Read and write files in the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_rw_var_files" lineno="7825">
<summary>
Do not audit attempts to read and write
files in the /var directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_manage_var_files" lineno="7843">
<summary>
Create, read, write, and delete files in the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_var_symlinks" lineno="7861">
<summary>
Read symbolic links in the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_var_symlinks" lineno="7880">
<summary>
Create, read, write, and delete symbolic
links in the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_var_filetrans" lineno="7913">
<summary>
Create objects in the /var directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="file_type">
<summary>
The type of the object to be created
</summary>
</param>
<param name="object_class">
<summary>
The object class.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_relabel_var_dirs" lineno="7932">
<summary>
Relabel dirs in the /var directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_var_lib_dirs" lineno="7949">
<summary>
Get the attributes of the /var/lib directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_search_var_lib" lineno="7981">
<summary>
Search the /var/lib directory.
</summary>
<desc>
<p>
Search the /var/lib directory. This is
necessary to access files or directories under
/var/lib that have a private type. For example, a
domain accessing a private library file in the
/var/lib directory:
</p>
<p>
allow mydomain_t mylibfile_t:file read_file_perms;
files_search_var_lib(mydomain_t)
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="5"/>
</interface>
<interface name="files_dontaudit_search_var_lib" lineno="8001">
<summary>
Do not audit attempts to search the
contents of /var/lib.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<infoflow type="read" weight="5"/>
</interface>
<interface name="files_list_var_lib" lineno="8019">
<summary>
List the contents of the /var/lib directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_var_lib_dirs" lineno="8037">
<summary>
Read-write /var/lib directories
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_map_var_lib_files" lineno="8055">
<summary>
Map /var/lib directories
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_var_lib_dirs" lineno="8073">
<summary>
Create directories in /var/lib
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_var_lib_symlinks" lineno="8091">
<summary>
Create symlinks in /var/lib
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_var_lib_filetrans" lineno="8124">
<summary>
Create objects in the /var/lib directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="file_type">
<summary>
The type of the object to be created
</summary>
</param>
<param name="object_class">
<summary>
The object class.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_read_var_lib_files" lineno="8143">
<summary>
Read generic files in /var/lib.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_var_lib_files" lineno="8162">
<summary>
Manage generic files in /var/lib.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_var_lib_symlinks" lineno="8180">
<summary>
Read generic symbolic links in /var/lib
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_var_lib_symlinks" lineno="8199">
<summary>
manage generic symbolic links
in the /var/lib directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_var_lib_dirs" lineno="8217">
<summary>
Manage generic directories in /var/lib.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_var_lib_dirs" lineno="8235">
<summary>
Watch generic directories in /var/lib.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_urandom_seed" lineno="8257">
<summary>
Create, read, write, and delete the
pseudorandom number generator seed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabelto_var_lib_dirs" lineno="8277">
<summary>
Relabel to dirs in the /var/lib directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_var_lib_dirs" lineno="8295">
<summary>
Relabel dirs in the /var/lib directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_mounttab" lineno="8313">
<summary>
Allow domain to manage mount tables
necessary for rpcd, nfsd, etc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_locks" lineno="8332">
<summary>
List generic lock directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_search_locks" lineno="8351">
<summary>
Search the locks directory (/var/lock).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_locks" lineno="8372">
<summary>
Do not audit attempts to search the
locks directory (/var/lock).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_rw_inherited_locks" lineno="8392">
<summary>
Do not audit attempts to read/write inherited
locks (/var/lock).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_setattr_lock_dirs" lineno="8410">
<summary>
Set the attributes of the /var/lock directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_lock_dirs" lineno="8429">
<summary>
Add and remove entries in the /var/lock
directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_lock_dirs" lineno="8448">
<summary>
Create lock directories
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_relabel_all_lock_dirs" lineno="8468">
<summary>
Relabel to and from all lock directory types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_all_lock_files" lineno="8489">
<summary>
Relabel to and from all lock file types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_getattr_generic_locks" lineno="8510">
<summary>
Get the attributes of generic lock files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_generic_locks" lineno="8530">
<summary>
Delete generic lock files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_generic_locks" lineno="8550">
<summary>
Create, read, write, and delete generic
lock files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_all_locks" lineno="8570">
<summary>
Delete all lock files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_read_all_locks" lineno="8591">
<summary>
Read all lock files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_all_locks" lineno="8613">
<summary>
manage all lock files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_lock_filetrans" lineno="8651">
<summary>
Create an object in the locks directory, with a private
type using a type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="private type">
<summary>
The type of the object to be created.
</summary>
</param>
<param name="object">
<summary>
The object class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_pid_dirs" lineno="8671">
<summary>
Do not audit attempts to get the attributes
of the /var/run directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_setattr_pid_dirs" lineno="8690">
<summary>
Set the attributes of the /var/run directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_search_pids" lineno="8710">
<summary>
Search the contents of runtime process
ID directories (/var/run).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_pid_dirs" lineno="8730">
<summary>
Add and remove entries from pid directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_var_run_dirs" lineno="8748">
<summary>
Create generic pid directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_pids" lineno="8768">
<summary>
Do not audit attempts to search
the /var/run directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_all_pids" lineno="8788">
<summary>
Do not audit attempts to search
the all /var/run directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_search_all_pids" lineno="8806">
<summary>
Allow search the all /var/run directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_watch_var_run_dirs" lineno="8824">
<summary>
Watch generic pid directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_var_run_path" lineno="8842">
<summary>
Watch generic pid directory and its parents.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_list_pids" lineno="8862">
<summary>
List the contents of the runtime process
ID directories (/var/run).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_generic_pids" lineno="8881">
<summary>
Read generic process ID files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_write_generic_pid_pipes" lineno="8901">
<summary>
Write named generic process ID pipes
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_write_generic_pid_sockets" lineno="8920">
<summary>
Write named generic process ID sockets
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_pid_filetrans" lineno="8981">
<summary>
Create an object in the process ID directory, with a private type.
</summary>
<desc>
<p>
Create an object in the process ID directory (e.g., /var/run)
with a private type. Typically this is used for creating
private PID files in /var/run with the private type instead
of the general PID file type. To accomplish this goal,
either the program must be SELinux-aware, or use this interface.
</p>
<p>
Related interfaces:
</p>
<ul>
<li>files_pid_file()</li>
</ul>
<p>
Example usage with a domain that can create and
write its PID file with a private PID file type in the
/var/run directory:
</p>
<p>
type mypidfile_t;
files_pid_file(mypidfile_t)
allow mydomain_t mypidfile_t:file { create_file_perms write_file_perms };
files_pid_filetrans(mydomain_t, mypidfile_t, file)
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="private type">
<summary>
The type of the object to be created.
</summary>
</param>
<param name="object">
<summary>
The object class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
<infoflow type="write" weight="10"/>
</interface>
<interface name="files_pid_filetrans_lock_dir" lineno="9005">
<summary>
Create a generic lock directory within the run directories
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_rw_inherited_generic_pid_files" lineno="9023">
<summary>
rw generic pid files inherited from another process
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_rw_generic_pids" lineno="9041">
<summary>
Read and write generic process ID files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_all_pids" lineno="9062">
<summary>
Do not audit attempts to get the attributes of
daemon runtime data files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_all_pids" lineno="9082">
<summary>
Do not audit attempts to write to daemon runtime data files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_ioctl_all_pids" lineno="9101">
<summary>
Do not audit attempts to ioctl daemon runtime data files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_relabel_all_pid_dirs" lineno="9121">
<summary>
Relable all pid directories
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_all_pid_sockets" lineno="9139">
<summary>
Delete all pid sockets
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_all_pid_sockets" lineno="9157">
<summary>
Create all pid sockets
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_create_all_pid_pipes" lineno="9175">
<summary>
Create all pid named pipes
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_all_pid_pipes" lineno="9193">
<summary>
Delete all pid named pipes
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_all_pid_dirs" lineno="9212">
<summary>
manage all pidfile directories
in the /var/run directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_all_pids" lineno="9232">
<summary>
Read all process ID files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_map_all_pids" lineno="9254">
<summary>
mmap all process ID files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_relabel_all_pid_files" lineno="9273">
<summary>
Relable all pid files
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_exec_generic_pid_files" lineno="9291">
<summary>
Execute generic programs in /var/run in the caller domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_write_all_pid_sockets" lineno="9310">
<summary>
Write all sockets
in the /var/run directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_all_pids" lineno="9329">
<summary>
manage all pidfiles
in the /var/run directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_mounton_all_poly_members" lineno="9348">
<summary>
Mount filesystems on all polyinstantiation
member directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_all_pids" lineno="9367">
<summary>
Delete all process IDs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_delete_all_pid_dirs" lineno="9392">
<summary>
Delete all process ID directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_spool_file" lineno="9442">
<summary>
Make the specified type a file
used for spool files.
</summary>
<desc>
<p>
Make the specified type usable for spool files.
This will also make the type usable for files, making
calls to files_type() redundant. Failure to use this interface
for a spool file may result in problems with
purging spool files.
</p>
<p>
Related interfaces:
</p>
<ul>
<li>files_spool_filetrans()</li>
</ul>
<p>
Example usage with a domain that can create and
write its spool file in the system spool file
directories (/var/spool):
</p>
<p>
type myspoolfile_t;
files_spool_file(myfile_spool_t)
allow mydomain_t myfile_spool_t:file { create_file_perms write_file_perms };
files_spool_filetrans(mydomain_t, myfile_spool_t, file)
</p>
</desc>
<param name="file_type">
<summary>
Type of the file to be used as a
spool file.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="files_create_all_spool_sockets" lineno="9461">
<summary>
Create all spool sockets
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_delete_all_spool_sockets" lineno="9479">
<summary>
Delete all spool sockets
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_relabel_all_spool_dirs" lineno="9499">
<summary>
Relabel to and from all spool
directory types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_search_spool" lineno="9519">
<summary>
Search the contents of generic spool
directories (/var/spool).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_spool" lineno="9538">
<summary>
Do not audit attempts to search generic
spool directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_list_spool" lineno="9557">
<summary>
List the contents of generic spool
(/var/spool) directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_generic_spool_dirs" lineno="9576">
<summary>
Create, read, write, and delete generic
spool directories (/var/spool).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_read_generic_spool" lineno="9595">
<summary>
Read generic spool files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_generic_spool" lineno="9615">
<summary>
Create, read, write, and delete generic
spool files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_spool_filetrans" lineno="9651">
<summary>
Create objects in the spool directory
with a private type with a type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="file">
<summary>
Type to which the created node will be transitioned.
</summary>
</param>
<param name="class">
<summary>
Object class(es) (single or set including {}) for which this
the transition will occur.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_polyinstantiate_all" lineno="9671">
<summary>
Allow access to manage all polyinstantiated
directories on the system.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_unconfined" lineno="9725">
<summary>
Unconfined access to files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_root_files" lineno="9749">
<summary>
Create a core files in /
</summary>
<desc>
<p>
Create a core file in /,
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_create_default_dir" lineno="9773">
<summary>
Create a default directory
</summary>
<desc>
<p>
Create a default_t direcrory
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_root_filetrans_default" lineno="9797">
<summary>
Create, default_t objects with an automatic
type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="object">
<summary>
The class of the object being created.
</summary>
</param>
</interface>
<interface name="files_filetrans_lib" lineno="9831">
<summary>
Create, lib_t objects with an automatic
type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="directory_type">
<summary>
Type of the directory to be transitioned from
</summary>
</param>
<param name="object">
<summary>
The class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="files_watch_lib_dirs" lineno="9849">
<summary>
Watch generic directories in /lib.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_manage_generic_pids_symlinks" lineno="9868">
<summary>
manage generic symbolic links
in the /var/run directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_watch_all_pid" lineno="9886">
<summary>
Watch the pidfile files and directories
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_dontaudit_getattr_tmpfs_files" lineno="9906">
<summary>
Do not audit attempts to getattr
all tmpfs files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_delete_tmpfs_files" lineno="9924">
<summary>
Allow delete all tmpfs files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_rw_tmpfs_files" lineno="9942">
<summary>
Allow read write all tmpfs files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_watch_tmpfs_dirs" lineno="9960">
<summary>
Watch a tmpfs directory.
</summary>
<param name="domain">
<summary>
Domain allowed access
</summary>
</param>
</interface>
<interface name="files_dontaudit_read_security_files" lineno="9978">
<summary>
Do not audit attempts to read security files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_search_security_files" lineno="9996">
<summary>
Do not audit attempts to search security files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_list_security_dirs" lineno="10014">
<summary>
Do not audit attempts to read security dirs
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_rw_all_inherited_files" lineno="10037">
<summary>
rw any files inherited from another process
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="object_type">
<summary>
Object type.
</summary>
</param>
</interface>
<interface name="files_entrypoint_all_files" lineno="10059">
<summary>
Allow any file point to be the entrypoint of this domain
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_dontaudit_all_non_security_leaks" lineno="10078">
<summary>
Do not audit attempts to rw inherited file perms
of non security files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_leaks" lineno="10097">
<summary>
Do not audit attempts to read or write
all leaked files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_create_as_is_all_files" lineno="10116">
<summary>
Allow domain to create_file_ass all types
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_all_access_check" lineno="10136">
<summary>
Do not audit attempts to check the
access on all files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_write_all_files" lineno="10154">
<summary>
Do not audit attempts to write to all files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_delete_all_files" lineno="10172">
<summary>
Do not audit attempts to unlink all files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_dontaudit_read_all_dirs" lineno="10196">
<summary>
Do not audit attempts to read all directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_delete_all_non_security_files" lineno="10214">
<summary>
Allow domain to delete to all files
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_delete_all_non_security_dirs" lineno="10233">
<summary>
Allow domain to delete to all dirs
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="files_filetrans_named_content" lineno="10251">
<summary>
Transition named content in the var_run_t directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_filetrans_named_content_var" lineno="10317">
<summary>
Transition named content in the var_t directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_base_file" lineno="10343">
<summary>
Make the specified type a
base file.
</summary>
<desc>
<p>
Identify file type as base file type. Tools will use this attribute,
to help users diagnose problems.
</p>
</desc>
<param name="file_type">
<summary>
Type to be used as a base files.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="files_ro_base_file" lineno="10368">
<summary>
Make the specified type a
base read only file.
</summary>
<desc>
<p>
Make the specified type readable for all domains.
</p>
</desc>
<param name="file_type">
<summary>
Type to be used as a base read only files.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="files_read_all_base_ro_files" lineno="10387">
<summary>
Read all ro base files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_exec_all_base_ro_files" lineno="10408">
<summary>
Execute all base ro files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="files_config_all_files" lineno="10427">
<summary>
Allow the specified domain to modify the systemd configuration of
any file.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_status_etc" lineno="10445">
<summary>
Get the status of etc_t files
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_dontaudit_mounton_modules_object" lineno="10463">
<summary>
Dontaudit Mount a modules_object_t
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="files_io_uring_cmd_on_all_files" lineno="10481">
<summary>
Allow the domain to use IORING_OP_URING_CMD on all files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
</module>
<module name="filesystem" filename="policy/modules/kernel/filesystem.if">
<summary>Policy for filesystems.</summary>
<required val="true">
Contains the initial SID for the filesystems.
</required>
<interface name="fs_type" lineno="16">
<summary>
Transform specified type into a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_noxattr_type" lineno="36">
<summary>
Transform specified type into a filesystem
type which does not have extended attribute
support.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_associate" lineno="59">
<summary>
Associate the specified file type to persistent
filesystems with extended attributes. This
allows a file of this type to be created on
a filesystem such as ext3, JFS, and XFS.
</summary>
<param name="file_type">
<summary>
The type of the to be associated.
</summary>
</param>
</interface>
<interface name="fs_associate_noxattr" lineno="81">
<summary>
Associate the specified file type to
filesystems which lack extended attributes
support. This allows a file of this type
to be created on a filesystem such as
FAT32, and NFS.
</summary>
<param name="file_type">
<summary>
The type of the to be associated.
</summary>
</param>
</interface>
<interface name="fs_exec_noxattr" lineno="101">
<summary>
Execute files on a filesystem that does
not support extended attributes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_mount_xattr_fs" lineno="121">
<summary>
Mount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_xattr_fs" lineno="142">
<summary>
Remount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS. This allows
some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_xattr_fs" lineno="162">
<summary>
Unmount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_all_mount_fs_perms_xattr_fs" lineno="182">
<summary>
Mount, remount, unmount a persistent filesystem which
has extended attributes, such as
ext3, JFS, or XFS.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_xattr_fs" lineno="218">
<summary>
Get the attributes of persistent
filesystems which have extended
attributes, such as ext3, JFS, or XFS.
</summary>
<desc>
<p>
Allow the specified domain to
get the attributes of a persistent
filesystems which have extended
attributes, such as ext3, JFS, or XFS.
Example attributes:
</p>
<ul>
<li>Type of the file system (e.g., ext3)</li>
<li>Size of the file system</li>
<li>Available space on the file system</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="5"/>
<rolecap/>
</interface>
<interface name="fs_dontaudit_getattr_xattr_fs" lineno="239">
<summary>
Do not audit attempts to
get the attributes of a persistent
filesystem which has extended
attributes, such as ext3, JFS, or XFS.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_relabelfrom_xattr_fs" lineno="259">
<summary>
Allow changing of the label of a
filesystem with extended attributes
using the context= mount option.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_xattr_fs" lineno="277">
<summary>
Watch filesystem with extended attributes
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_get_xattr_fs_quotas" lineno="297">
<summary>
Get the filesystem quotas of a filesystem
with extended attributes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_set_xattr_fs_quotas" lineno="317">
<summary>
Set the filesystem quotas of a filesystem
with extended attributes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_read_anon_inodefs_files" lineno="335">
<summary>
Read files on anon_inodefs file systems. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_anon_inodefs_files" lineno="350">
<summary>
Read and write files on anon_inodefs
file systems. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_rw_anon_inodefs_files" lineno="365">
<summary>
Do not audit attempts to read or write files on
anon_inodefs file systems. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_mount_autofs" lineno="379">
<summary>
Mount an automount pseudo filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_autofs" lineno="398">
<summary>
Remount an automount pseudo filesystem
This allows some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_autofs" lineno="416">
<summary>
Unmount an automount pseudo filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_autofs" lineno="435">
<summary>
Get the attributes of an automount
pseudo filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_auto_mountpoints" lineno="462">
<summary>
Search automount filesystem to use automatically
mounted filesystems.
</summary>
<desc>
Allow the specified domain to search mount points
that have filesystems that are mounted by
the automount service. Generally this will
be required for any domain that accesses objects
on these filesystems.
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="5"/>
</interface>
<interface name="fs_list_auto_mountpoints" lineno="482">
<summary>
Read directories of automatically
mounted filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_list_auto_mountpoints" lineno="501">
<summary>
Do not audit attempts to list directories of automatically
mounted filesystems.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_autofs_symlinks" lineno="520">
<summary>
Create, read, write, and delete symbolic links
on an autofs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_binfmt_misc_dirs" lineno="539">
<summary>
Get the attributes of directories on
binfmt_misc filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_binfmt_misc" lineno="558">
<summary>
Read binfmt_misc filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_register_binary_executable_type" lineno="594">
<summary>
Register an interpreter for new binary
file types, using the kernel binfmt_misc
support.
</summary>
<desc>
<p>
Register an interpreter for new binary
file types, using the kernel binfmt_misc
support.
</p>
<p>
A common use for this is to
register a JVM as an interpreter for
Java byte code. Registered binaries
can be directly executed on a command line
without specifying the interpreter.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_list_bpf_dirs" lineno="612">
<summary>
List bpf directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_bpf_dirs" lineno="632">
<summary>
Manage bpf directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_bpf_files" lineno="653">
<summary>
Read bpf files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mount_cgroup" lineno="674">
<summary>
Mount cgroup filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_associate_cgroupfs" lineno="692">
<summary>
Allow the type to associate to cgroup filesystems.
</summary>
<param name="type">
<summary>
The type of the object to be associated.
</summary>
</param>
</interface>
<interface name="fs_remount_cgroup" lineno="710">
<summary>
Remount cgroup filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_cgroup" lineno="728">
<summary>
Unmount cgroup filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_cgroup" lineno="746">
<summary>
Get attributes of cgroup filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_cgroup_files" lineno="764">
<summary>
Get attributes of cgroup files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_cgroup_dirs" lineno="785">
<summary>
Search cgroup directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_relabel_cgroup_dirs" lineno="806">
<summary>
Relabel cgroup directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_cgroup_dirs" lineno="825">
<summary>
list cgroup directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_search_cgroup_dirs" lineno="845">
<summary>
Do not audit attempts to search cgroup directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_delete_cgroup_dirs" lineno="864">
<summary>
Delete cgroup directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_cgroup_dirs" lineno="884">
<summary>
Manage cgroup directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_cgroup_dirs" lineno="905">
<summary>
Watch cgroup directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_cgroup_files" lineno="926">
<summary>
Read cgroup files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_write_cgroup_files" lineno="948">
<summary>
Write cgroup files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_cgroup_files" lineno="968">
<summary>
Read and write cgroup files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_rw_cgroup_files" lineno="992">
<summary>
Do not audit attempts to open,
get attributes, read and write
cgroup files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_relabel_cgroup_files" lineno="1010">
<summary>
Relabel cgroup files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_create_cgroup_files" lineno="1029">
<summary>
Create cgroup files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_cgroup_files" lineno="1048">
<summary>
Manage cgroup files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_cgroup_files" lineno="1069">
<summary>
Watch cgroup files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mounton_cgroup" lineno="1091">
<summary>
Mount on cgroup directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_cephfs_files" lineno="1109">
<summary>
Read and write ceph files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_list_cifs_dirs" lineno="1130">
<summary>
Do not audit attempts to read
dirs on a CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_mount_cifs" lineno="1148">
<summary>
Mount a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_cifs" lineno="1167">
<summary>
Remount a CIFS or SMB network filesystem.
This allows some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_cifs" lineno="1185">
<summary>
Unmount a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_cifs" lineno="1205">
<summary>
Get the attributes of a CIFS or
SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_setattr_cifs_dirs" lineno="1223">
<summary>
Set the attributes of cifs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_cifs" lineno="1241">
<summary>
Search directories on a CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_cifs" lineno="1260">
<summary>
List the contents of directories on a
CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_list_cifs" lineno="1279">
<summary>
Do not audit attempts to list the contents
of directories on a CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_mounton_cifs" lineno="1297">
<summary>
Mounton a CIFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_cifs_files" lineno="1316">
<summary>
Read files on a CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_getattr_noxattr_fs" lineno="1337">
<summary>
Get the attributes of filesystems that
do not have extended attribute support.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_list_noxattr_fs" lineno="1355">
<summary>
Read all noxattrfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_list_noxattr_fs" lineno="1374">
<summary>
Do not audit attempts to list all
noxattrfs directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_noxattr_fs_dirs" lineno="1392">
<summary>
Create, read, write, and delete all noxattrfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_noxattr_fs_files" lineno="1410">
<summary>
Read all noxattrfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_inherited_noxattr_fs_files" lineno="1428">
<summary>
Read/Write all inherited noxattrfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_read_noxattr_fs_files" lineno="1447">
<summary>
Do not audit attempts to read all
noxattrfs files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_write_noxattr_fs_files" lineno="1465">
<summary>
Dont audit attempts to write to noxattrfs files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_noxattr_fs_files" lineno="1483">
<summary>
Create, read, write, and delete all noxattrfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_noxattr_fs_symlinks" lineno="1501">
<summary>
Read all noxattrfs symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_relabelfrom_noxattr_fs" lineno="1520">
<summary>
Relabel all objets from filesystems that
do not support extended attributes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_read_cifs_files" lineno="1546">
<summary>
Do not audit attempts to read
files on a CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_append_cifs_files" lineno="1566">
<summary>
Append files
on a CIFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_append_cifs_files" lineno="1586">
<summary>
Do not audit attempts to append files
on a CIFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_read_inherited_cifs_files" lineno="1604">
<summary>
Read inherited files on a CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_inherited_cifs_files" lineno="1622">
<summary>
Read/Write inherited files on a CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_rw_cifs_files" lineno="1641">
<summary>
Do not audit attempts to read or
write files on a CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_read_cifs_symlinks" lineno="1659">
<summary>
Read symbolic links on a CIFS or SMB filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_cifs_named_pipes" lineno="1679">
<summary>
Read named pipes
on a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_cifs_named_sockets" lineno="1698">
<summary>
Read named pipes
on a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_exec_cifs_files" lineno="1719">
<summary>
Execute files on a CIFS or SMB
network filesystem, in the caller
domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_map_cifs_files" lineno="1741">
<summary>
Mmap files on a CIFS or SMB
network filesystem, in the caller
domain.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_manage_cifs_dirs" lineno="1761">
<summary>
Create, read, write, and delete directories
on a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_manage_cifs_dirs" lineno="1781">
<summary>
Do not audit attempts to create, read,
write, and delete directories
on a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_cifs_files" lineno="1801">
<summary>
Create, read, write, and delete files
on a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_manage_cifs_files" lineno="1821">
<summary>
Do not audit attempts to create, read,
write, and delete files
on a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_cifs_symlinks" lineno="1840">
<summary>
Create, read, write, and delete symbolic links
on a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_cifs_named_pipes" lineno="1859">
<summary>
Create, read, write, and delete named pipes
on a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_cifs_named_sockets" lineno="1878">
<summary>
Create, read, write, and delete named sockets
on a CIFS or SMB network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_cifs_domtrans" lineno="1921">
<summary>
Execute a file on a CIFS or SMB filesystem
in the specified domain.
</summary>
<desc>
<p>
Execute a file on a CIFS or SMB filesystem
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
<p>
This interface was added to handle
home directories on CIFS/SMB filesystems,
in particular used by the ssh-agent policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="fs_cifs_entry_type" lineno="1941">
<summary>
Make general progams in cifs an entrypoint for
the specified domain.
</summary>
<param name="domain">
<summary>
The domain for which cifs_t is an entrypoint.
</summary>
</param>
</interface>
<interface name="fs_cifs_entrypoint" lineno="1960">
<summary>
Make general progams in CIFS an entrypoint for
the specified domain.
</summary>
<param name="domain">
<summary>
The domain for which cifs_t is an entrypoint.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_write_configfs_dirs" lineno="1979">
<summary>
dontaudit write dirs
on a configfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_configfs_dirs" lineno="1998">
<summary>
Read dirs
on a configfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_configfs_dirs" lineno="2017">
<summary>
Create, read, write, and delete dirs
on a configfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_configfs_files" lineno="2036">
<summary>
Read files
on a configfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_configfs_files" lineno="2055">
<summary>
Create, read, write, and delete files
on a configfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_configfs_lnk_files" lineno="2074">
<summary>
Create, read, write, and delete files
on a configfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_configfs" lineno="2092">
<summary>
Unmount a configfs filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mount_dos_fs" lineno="2111">
<summary>
Mount a DOS filesystem, such as
FAT32 or NTFS.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_dos_fs" lineno="2131">
<summary>
Remount a DOS filesystem, such as
FAT32 or NTFS. This allows
some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_dos_fs" lineno="2150">
<summary>
Unmount a DOS filesystem, such as
FAT32 or NTFS.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_dos_fs" lineno="2170">
<summary>
Get the attributes of a DOS
filesystem, such as FAT32 or NTFS.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_relabelfrom_dos_fs" lineno="2189">
<summary>
Allow changing of the label of a
DOS filesystem using the context= mount option.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_dos_fs" lineno="2207">
<summary>
Watch dosfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_dos" lineno="2225">
<summary>
Search dosfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_dos" lineno="2243">
<summary>
List dirs DOS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_dos_dirs" lineno="2262">
<summary>
Create, read, write, and delete dirs
on a DOS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_sb_dos_dirs" lineno="2280">
<summary>
Watch_sb dirs on a DOS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_mount_dos_dirs" lineno="2298">
<summary>
Watch_mount dirs on a DOS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_with_perm_dos_dirs" lineno="2316">
<summary>
Watch_with_perm dirs on a DOS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_map_dos_files" lineno="2334">
<summary>
Mmap files on a DOS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_dos_files" lineno="2352">
<summary>
Read files on a DOS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_dos_files" lineno="2371">
<summary>
Create, read, write, and delete files
on a DOS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_eventpollfs" lineno="2399">
<summary>
Read eventpollfs files.
</summary>
<desc>
<p>
Read eventpollfs files
</p>
<p>
This interface has been deprecated, and will
be removed in the future.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_ecryptfs" lineno="2413">
<summary>
Get the attributes of an ecryptfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_ecryptfs" lineno="2432">
<summary>
Search directories
on a ecrypt filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_ecryptfs_dirs" lineno="2452">
<summary>
Create, read, write, and delete directories
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_read_ecryptfs_files" lineno="2473">
<summary>
Create, read, write, and delete files
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_manage_ecryptfs_files" lineno="2493">
<summary>
Create, read, write, and delete files
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_manage_ecryptfs_files" lineno="2514">
<summary>
Do not audit attempts to create,
read, write, and delete files
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_read_ecryptfs_symlinks" lineno="2532">
<summary>
Read symbolic links on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_append_ecryptfs_files" lineno="2551">
<summary>
Dontaudit append files on ecrypt filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_ecryptfs_symlinks" lineno="2568">
<summary>
Manage symbolic links on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_ecryptfs_domtrans" lineno="2611">
<summary>
Execute a file on a FUSE filesystem
in the specified domain.
</summary>
<desc>
<p>
Execute a file on a FUSE filesystem
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
<p>
This interface was added to handle
home directories on FUSE filesystems,
in particular used by the ssh-agent policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="fs_mount_fusefs" lineno="2630">
<summary>
Mount a FUSE filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_fusefs" lineno="2648">
<summary>
Unmount a FUSE filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mounton_fusefs" lineno="2666">
<summary>
Mounton a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_fusefs" lineno="2686">
<summary>
Search directories
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_list_fusefs" lineno="2705">
<summary>
Do not audit attempts to list the contents
of directories on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_fusefs_dirs" lineno="2725">
<summary>
Create, read, write, and delete directories
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_manage_fusefs_dirs" lineno="2745">
<summary>
Do not audit attempts to create, read,
write, and delete directories
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_read_fusefs_files" lineno="2764">
<summary>
Read, a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_exec_fusefs_files" lineno="2783">
<summary>
Execute files on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_mmap_fusefs_files" lineno="2802">
<summary>
mmap files on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_manage_fusefs_named_sockets" lineno="2821">
<summary>
Create, read, write, and delete named sockets
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_fusefs_named_pipes" lineno="2839">
<summary>
Create, read, write, and delete named pipes
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_fusefs_entry_type" lineno="2858">
<summary>
Make general progams in FUSEFS an entrypoint for
the specified domain.
</summary>
<param name="domain">
<summary>
The domain for which fusefs_t is an entrypoint.
</summary>
</param>
</interface>
<interface name="fs_fusefs_entrypoint" lineno="2877">
<summary>
Make general progams in FUSEFS an entrypoint for
the specified domain.
</summary>
<param name="domain">
<summary>
The domain for which fusefs_t is an entrypoint.
</summary>
</param>
</interface>
<interface name="fs_manage_fusefs_files" lineno="2897">
<summary>
Create, read, write, and delete files
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_manage_fusefs_files" lineno="2917">
<summary>
Do not audit attempts to create,
read, write, and delete files
on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_read_fusefs_symlinks" lineno="2935">
<summary>
Read symbolic links on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_fusefs_symlinks" lineno="2954">
<summary>
Manage symbolic links on a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_fusefs_domtrans" lineno="2997">
<summary>
Execute a file on a FUSE filesystem
in the specified domain.
</summary>
<desc>
<p>
Execute a file on a FUSE filesystem
in the specified domain. This allows
the specified domain to execute any file
on these filesystems in the specified
domain. This is not suggested.
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
<p>
This interface was added to handle
home directories on FUSE filesystems,
in particular used by the ssh-agent policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="fs_getattr_fusefs" lineno="3017">
<summary>
Get the attributes of a FUSEFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_getattr_hugetlbfs" lineno="3036">
<summary>
Get the attributes of an hugetlbfs
filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_hugetlbfs" lineno="3054">
<summary>
List hugetlbfs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_hugetlbfs_dirs" lineno="3072">
<summary>
Manage hugetlbfs dirs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_hugetlbfs_files" lineno="3090">
<summary>
Read hugetlbfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_hugetlbfs_files" lineno="3108">
<summary>
Read and write hugetlbfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_hugetlbfs_files" lineno="3127">
<summary>
Manage hugetlbfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_exec_hugetlbfs_files" lineno="3145">
<summary>
Execute hugetlbfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_associate_hugetlbfs" lineno="3164">
<summary>
Allow the type to associate to hugetlbfs filesystems.
</summary>
<param name="type">
<summary>
The type of the object to be associated.
</summary>
</param>
</interface>
<interface name="fs_list_oracleasmfs" lineno="3182">
<summary>
List oracleasmfs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_oracleasmfs_fs" lineno="3201">
<summary>
Get the attributes of an oracleasmfs
filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_oracleasmfs" lineno="3220">
<summary>
Get the attributes of an oracleasmfs
filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_setattr_oracleasmfs" lineno="3239">
<summary>
Get the attributes of an oracleasmfs
filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_setattr_oracleasmfs_dirs" lineno="3258">
<summary>
Get the attributes of an oracleasmfs
filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_oracleasm" lineno="3276">
<summary>
Read and write the oracleasm device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_inotifyfs" lineno="3296">
<summary>
Search inotifyfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_inotifyfs" lineno="3310">
<summary>
List inotifyfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_list_inotifyfs" lineno="3324">
<summary>
Do not audit attempts to list inotifyfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_hugetlbfs_filetrans" lineno="3354">
<summary>
Create an object in a hugetlbfs filesystem, with a private
type using a type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="private type">
<summary>
The type of the object to be created.
</summary>
</param>
<param name="object">
<summary>
The object class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="fs_mount_iso9660_fs" lineno="3374">
<summary>
Mount an iso9660 filesystem, which
is usually used on CDs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_iso9660_fs" lineno="3394">
<summary>
Remount an iso9660 filesystem, which
is usually used on CDs. This allows
some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_iso9660_fs" lineno="3413">
<summary>
Unmount an iso9660 filesystem, which
is usually used on CDs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_iso9660_fs" lineno="3433">
<summary>
Get the attributes of an iso9660
filesystem, which is usually used on CDs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_getattr_iso9660_files" lineno="3452">
<summary>
Read files on an iso9660 filesystem, which
is usually used on CDs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_iso9660_files" lineno="3472">
<summary>
Read files on an iso9660 filesystem, which
is usually used on CDs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mount_nfs" lineno="3492">
<summary>
Mount a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_nfs" lineno="3511">
<summary>
Remount a NFS filesystem. This allows
some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_nfs" lineno="3529">
<summary>
Unmount a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_nfs" lineno="3548">
<summary>
Get the attributes of a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_setattr_nfs_dirs" lineno="3566">
<summary>
Set the attributes of nfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_nfs" lineno="3584">
<summary>
Search directories on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_nfs" lineno="3602">
<summary>
List NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_list_nfs" lineno="3621">
<summary>
Do not audit attempts to list the contents
of directories on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_mounton_nfs" lineno="3639">
<summary>
Mounton a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_nfs_files" lineno="3658">
<summary>
Read files on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_read_nfs_files" lineno="3679">
<summary>
Do not audit attempts to read
files on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_write_nfs_files" lineno="3697">
<summary>
Read files on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_exec_nfs_files" lineno="3718">
<summary>
Execute files on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_nfs_entry_type" lineno="3738">
<summary>
Make general progams in nfs an entrypoint for
the specified domain.
</summary>
<param name="domain">
<summary>
The domain for which nfs_t is an entrypoint.
</summary>
</param>
</interface>
<interface name="fs_nfs_entrypoint" lineno="3757">
<summary>
Make general progams in NFS an entrypoint for
the specified domain.
</summary>
<param name="domain">
<summary>
The domain for which nfs_t is an entrypoint.
</summary>
</param>
</interface>
<interface name="fs_append_nfs_files" lineno="3777">
<summary>
Append files
on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_append_nfs_files" lineno="3797">
<summary>
Do not audit attempts to append files
on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_read_inherited_nfs_files" lineno="3815">
<summary>
Read inherited files on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_inherited_nfs_files" lineno="3833">
<summary>
Read/write inherited files on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_rw_nfs_files" lineno="3852">
<summary>
Do not audit attempts to read or
write files on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_read_nfs_symlinks" lineno="3870">
<summary>
Read symbolic links on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_read_nfs_symlinks" lineno="3889">
<summary>
Do not audit attempts to read symbolic links on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_read_nfs_named_sockets" lineno="3907">
<summary>
Read named sockets on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_nfs_named_pipes" lineno="3926">
<summary>
Read named pipes on a NFS network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_getattr_rpc_dirs" lineno="3944">
<summary>
Read directories of RPC file system pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_rpc_dirs" lineno="3962">
<summary>
Watch directories of RPC file system pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_rpc" lineno="3980">
<summary>
Search directories of RPC file system pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_pstorefs" lineno="4007">
<summary>
Do not audit attempts to list removable storage directories.
</summary>
<desc>
<p>
Do not audit attempts to list removable storage directories
</p>
<p>
This interface has been deprecated, and will
be removed in the future.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_pstore" lineno="4021">
<summary>
List kernel persistent storage directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_read_pstore_files" lineno="4039">
<summary>
Read kernel persistent storage files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_delete_pstore_files" lineno="4058">
<summary>
Delete kernel persistent storage files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_relabel_pstore_dirs" lineno="4077">
<summary>
Relabel directory on removable storage.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_removable" lineno="4095">
<summary>
Search removable storage directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_list_removable" lineno="4113">
<summary>
Do not audit attempts to list removable storage directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_read_removable_files" lineno="4131">
<summary>
Read removable storage files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mmap_removable_files" lineno="4151">
<summary>
mmap files on a removable files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_read_removable_files" lineno="4169">
<summary>
Do not audit attempts to read removable storage files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_write_removable_files" lineno="4187">
<summary>
Do not audit attempts to write removable storage files.
</summary>
<param name="domain">
<summary>
Domain not to audit.
</summary>
</param>
</interface>
<interface name="fs_read_removable_symlinks" lineno="4205">
<summary>
Read removable storage symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_removable_blk_files" lineno="4223">
<summary>
Read block nodes on removable filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_removable_blk_files" lineno="4242">
<summary>
Read and write block nodes on removable filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_rpc" lineno="4261">
<summary>
Read directories of RPC file system pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_rpc_files" lineno="4279">
<summary>
Read files of RPC file system pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_rpc_symlinks" lineno="4297">
<summary>
Read symbolic links of RPC file system pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_rpc_sockets" lineno="4315">
<summary>
Read sockets of RPC file system pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_rpc_sockets" lineno="4333">
<summary>
Read and write sockets of RPC file system pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_create_nfs_dirs" lineno="4352">
<summary>
Create directories on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_create_nfs_files" lineno="4372">
<summary>
Create files on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_manage_nfs_dirs" lineno="4393">
<summary>
Create, read, write, and delete directories
on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_manage_nfs_dirs" lineno="4414">
<summary>
Do not audit attempts to create, read,
write, and delete directories
on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_nfs_files" lineno="4434">
<summary>
Create, read, write, and delete files
on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_mmap_nfs_files" lineno="4454">
<summary>
mmap files on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_manage_nfs_files" lineno="4474">
<summary>
Do not audit attempts to create,
read, write, and delete files
on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_nfs_symlinks" lineno="4494">
<summary>
Create, read, write, and delete symbolic links
on a NFS network filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_manage_nfs_named_pipes" lineno="4514">
<summary>
Create, read, write, and delete named pipes
on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_nfs_named_sockets" lineno="4533">
<summary>
Create, read, write, and delete named sockets
on a NFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_nfs_domtrans" lineno="4576">
<summary>
Execute a file on a NFS filesystem
in the specified domain.
</summary>
<desc>
<p>
Execute a file on a NFS filesystem
in the specified domain. This allows
the specified domain to execute any file
on a NFS filesystem in the specified
domain. This is not suggested.
</p>
<p>
No interprocess communication (signals, pipes,
etc.) is provided by this interface since
the domains are not owned by this module.
</p>
<p>
This interface was added to handle
home directories on NFS filesystems,
in particular used by the ssh-agent policy.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="fs_mounton_nfsd_fs" lineno="4595">
<summary>
Mount on nfsd_fs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mount_nfsd_fs" lineno="4613">
<summary>
Mount a NFS server pseudo filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_nfsd_fs" lineno="4632">
<summary>
Mount a NFS server pseudo filesystem.
This allows some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_nfsd_fs" lineno="4650">
<summary>
Unmount a NFS server pseudo filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_nfsd_fs" lineno="4669">
<summary>
Get the attributes of a NFS server
pseudo filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_nfsd_fs" lineno="4687">
<summary>
Search NFS server directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_nfsd_fs" lineno="4705">
<summary>
List NFS server directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_nfsd_files" lineno="4723">
<summary>
Getattr files on an nfsd filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_nfsd_files" lineno="4741">
<summary>
read files on an nfsd filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_nfsd_fs" lineno="4759">
<summary>
Read and write NFS server files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_getattr_nsfs_files" lineno="4777">
<summary>
Getattr files on an nsfs filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_nsfs_files" lineno="4796">
<summary>
Getattr files on an nsfs filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_nsfs_files" lineno="4814">
<summary>
Read nsfs inodes (e.g. /proc/pid/ns/uts)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_nsfs_files" lineno="4832">
<summary>
Read and write nsfs inodes (e.g. /proc/pid/ns/uts)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mount_nsfs" lineno="4851">
<summary>
Mount a nsfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_nsfs" lineno="4870">
<summary>
Remount a tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_nsfs" lineno="4888">
<summary>
Unmount a tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_nfsd_fs" lineno="4906">
<summary>
Manage NFS server files and directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_associate_ramfs" lineno="4925">
<summary>
Allow the type to associate to ramfs filesystems. (Deprecated)
</summary>
<param name="type">
<summary>
The type of the object to be associated.
</summary>
</param>
</interface>
<interface name="fs_associate_proc" lineno="4940">
<summary>
Allow the type to associate to proc filesystems.
</summary>
<param name="type">
<summary>
The type of the object to be associated.
</summary>
</param>
</interface>
<interface name="fs_mount_ramfs" lineno="4958">
<summary>
Mount a RAM filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_ramfs" lineno="4974">
<summary>
Remount a RAM filesystem. This allows
some mount options to be changed. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_ramfs" lineno="4989">
<summary>
Unmount a RAM filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_ramfs" lineno="5004">
<summary>
Get the attributes of a RAM filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_ramfs" lineno="5019">
<summary>
Search directories on a ramfs (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_search_ramfs" lineno="5034">
<summary>
Do not audit attempts to search directories on a ramfs (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_ramfs_dirs" lineno="5049">
<summary>
Create, read, write, and delete
directories on a ramfs. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_read_ramfs_files" lineno="5064">
<summary>
Do not audit attempts to read on a ramfs files. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_read_ramfs_pipes" lineno="5079">
<summary>
Do not audit attempts to read on a ramfs fifo_files. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_ramfs_files" lineno="5094">
<summary>
Create, read, write, and delete
files on a ramfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_write_ramfs_pipes" lineno="5109">
<summary>
Write to named pipe on a ramfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_write_ramfs_pipes" lineno="5124">
<summary>
Do not audit attempts to write to named
pipes on a ramfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_rw_ramfs_pipes" lineno="5138">
<summary>
Read and write a named pipe on a ramfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_ramfs_pipes" lineno="5153">
<summary>
Create, read, write, and delete
named pipes on a ramfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_write_ramfs_sockets" lineno="5167">
<summary>
Write to named socket on a ramfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_ramfs_sockets" lineno="5182">
<summary>
Create, read, write, and delete
named sockets on a ramfs filesystem. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mount_romfs" lineno="5196">
<summary>
Mount a ROM filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_romfs" lineno="5215">
<summary>
Remount a ROM filesystem. This allows
some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_romfs" lineno="5233">
<summary>
Unmount a ROM filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_romfs" lineno="5252">
<summary>
Get the attributes of a ROM
filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mount_rpc_pipefs" lineno="5270">
<summary>
Mount a RPC pipe filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_rpc_pipefs" lineno="5289">
<summary>
Remount a RPC pipe filesystem. This
allows some mount option to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_rpc_pipefs" lineno="5307">
<summary>
Unmount a RPC pipe filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_rpc_pipefs" lineno="5326">
<summary>
Get the attributes of a RPC pipe
filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_rpc_named_pipes" lineno="5344">
<summary>
Read and write RPC pipe filesystem named pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mount_tmpfs" lineno="5362">
<summary>
Mount a tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_tmpfs" lineno="5380">
<summary>
Watch a tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_remount_tmpfs" lineno="5398">
<summary>
Dontaudit remount a tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_remount_tmpfs" lineno="5416">
<summary>
Remount a tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_tmpfs" lineno="5434">
<summary>
Unmount a tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_all_mount_fs_perms_tmpfs" lineno="5452">
<summary>
Mount, remount, unmount a tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mounton_tmpfs" lineno="5470">
<summary>
Mount on tmpfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_sb_tmpfs" lineno="5488">
<summary>
Watch_sb tmpfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_tmpfs" lineno="5508">
<summary>
Get the attributes of a tmpfs
filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_associate_tmpfs" lineno="5526">
<summary>
Allow the type to associate to tmpfs filesystems.
</summary>
<param name="type">
<summary>
The type of the object to be associated.
</summary>
</param>
</interface>
<interface name="fs_relabelfrom_tmpfs" lineno="5544">
<summary>
Relabel from tmpfs filesystem.
</summary>
<param name="type">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_tmpfs_dirs" lineno="5562">
<summary>
Get the attributes of tmpfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_getattr_tmpfs_dirs" lineno="5581">
<summary>
Do not audit attempts to get the attributes
of tmpfs directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_setattr_tmpfs_dirs" lineno="5599">
<summary>
Set the attributes of tmpfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_tmpfs" lineno="5617">
<summary>
Search tmpfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_tmpfs" lineno="5635">
<summary>
List the contents of generic tmpfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_list_tmpfs" lineno="5654">
<summary>
Do not audit attempts to list the
contents of generic tmpfs directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_relabel_tmpfs_dirs" lineno="5672">
<summary>
Relabel directory on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_mount_tmpfs_dirs" lineno="5690">
<summary>
Watch_mount directory on the tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_with_perm_tmpfs_dirs" lineno="5709">
<summary>
Watch_with_perm directory on the tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_relabel_tmpfs_fifo_files" lineno="5728">
<summary>
Relabel fifo_file on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_relabel_tmpfs_files" lineno="5746">
<summary>
Relabel files on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_delete_tmpfs_dirs" lineno="5764">
<summary>
Delete tmpfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_tmpfs_dirs" lineno="5784">
<summary>
Create, read, write, and delete
tmpfs directories
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_write_tmpfs_dirs" lineno="5803">
<summary>
Do not audit attempts to write
tmpfs directories
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_tmpfs_filetrans" lineno="5837">
<summary>
Create an object in a tmpfs filesystem, with a private
type using a type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="private type">
<summary>
The type of the object to be created.
</summary>
</param>
<param name="object">
<summary>
The object class of the object being created.
</summary>
</param>
<param name="name" optional="true">
<summary>
The name of the object being created.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_getattr_tmpfs_files" lineno="5857">
<summary>
Do not audit attempts to getattr
generic tmpfs files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_rw_tmpfs_files" lineno="5876">
<summary>
Do not audit attempts to read or write
generic tmpfs files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_auto_mountpoints" lineno="5895">
<summary>
Create, read, write, and delete
auto moutpoints.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_tmpfs_files" lineno="5913">
<summary>
Read generic tmpfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_tmpfs_files" lineno="5931">
<summary>
Read and write generic tmpfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_inherited_tmpfs_files" lineno="5949">
<summary>
Read and write generic tmpfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_tmpfs_symlinks" lineno="5967">
<summary>
Read tmpfs link files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_relabelfrom_tmpfs_lnk_files" lineno="5985">
<summary>
Relabel from tmpfs lnk files.
</summary>
<param name="type">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_tmpfs_chr_files" lineno="6003">
<summary>
Read and write character nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_use_tmpfs_chr_dev" lineno="6022">
<summary>
Do not audit attempts to read and write character nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_create_tmpfs_chr_dev" lineno="6041">
<summary>
Do not audit attempts to create character nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_read_tmpfs_blk_dev" lineno="6059">
<summary>
Do not audit attempts to dontaudit read block nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_read_tmpfs_files" lineno="6077">
<summary>
Do not audit attempts to read files on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_relabel_tmpfs_chr_file" lineno="6095">
<summary>
Relabel character nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_tmpfs_blk_files" lineno="6114">
<summary>
Read and write block nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_tmpfs_blk_file" lineno="6133">
<summary>
Relabel block nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_relabel_tmpfs_blk_file" lineno="6151">
<summary>
Relabel block nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_relabel_tmpfs_sock_file" lineno="6170">
<summary>
Relabel sock nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_delete_tmpfs_files" lineno="6189">
<summary>
Delete generic files in tmpfs directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_tmpfs_files" lineno="6209">
<summary>
Read and write, create and delete generic
files on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_exec_tmpfs_files" lineno="6228">
<summary>
Execute files on a tmpfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_manage_tmpfs_symlinks" lineno="6247">
<summary>
Read and write, create and delete symbolic
links on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_tmpfs_sockets" lineno="6266">
<summary>
Read and write, create and delete socket
files on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_write_tmpfs_socket_files" lineno="6284">
<summary>
Write to socket files on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_tmpfs_chr_files" lineno="6304">
<summary>
Read and write, create and delete character
nodes on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_tmpfs_blk_files" lineno="6323">
<summary>
Read and write, create and delete block nodes
on tmpfs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_mount_xenfs" lineno="6341">
<summary>
Mount a XENFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_xenfs" lineno="6359">
<summary>
Search the XENFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_xenfs_files" lineno="6378">
<summary>
Read files on a XENFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_xenfs_dirs" lineno="6398">
<summary>
Create, read, write, and delete directories
on a XENFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_manage_xenfs_dirs" lineno="6418">
<summary>
Do not audit attempts to create, read,
write, and delete directories
on a XENFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_manage_xenfs_files" lineno="6438">
<summary>
Create, read, write, and delete files
on a XENFS filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_dontaudit_manage_xenfs_files" lineno="6458">
<summary>
Do not audit attempts to create,
read, write, and delete files
on a XENFS filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_mount_all_fs" lineno="6476">
<summary>
Mount all filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_all_fs" lineno="6497">
<summary>
Remount all filesystems. This
allows some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_all_fs" lineno="6515">
<summary>
Unmount all filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_watch_all_fs" lineno="6533">
<summary>
Watch all filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_all_fs" lineno="6565">
<summary>
Get the attributes of all filesystems.
</summary>
<desc>
<p>
Allow the specified domain to
get the attributes of all filesystems.
Example attributes:
</p>
<ul>
<li>Type of the file system (e.g., ext3)</li>
<li>Size of the file system</li>
<li>Available space on the file system</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="5"/>
<rolecap/>
</interface>
<interface name="fs_dontaudit_getattr_all_fs" lineno="6585">
<summary>
Do not audit attempts to get the attributes
all filesystems.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_all_access_check" lineno="6604">
<summary>
Do not audit attempts to check the
access on all filesystems.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_get_all_fs_quotas" lineno="6624">
<summary>
Get the quotas of all filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_set_all_quotas" lineno="6643">
<summary>
Set the quotas of all filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_relabelfrom_all_fs" lineno="6661">
<summary>
Relabelfrom all filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_all_dirs" lineno="6680">
<summary>
Get the attributes of all directories
with a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_getattr_all_dirs" lineno="6699">
<summary>
Dontaudit Get the attributes of all directories
with a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_map_all_dirs" lineno="6718">
<summary>
Dontaudit map of all directories
with a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_all" lineno="6736">
<summary>
Search all directories with a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_list_all" lineno="6754">
<summary>
List all directories with a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_all_files" lineno="6773">
<summary>
Get the attributes of all files with
a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_getattr_all_files" lineno="6792">
<summary>
Do not audit attempts to get the attributes
of all files with a filesystem type.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_getattr_all_symlinks" lineno="6811">
<summary>
Get the attributes of all symbolic links with
a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_getattr_all_symlinks" lineno="6830">
<summary>
Do not audit attempts to get the attributes
of all symbolic links with a filesystem type.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_getattr_all_pipes" lineno="6849">
<summary>
Get the attributes of all named pipes with
a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_getattr_all_pipes" lineno="6868">
<summary>
Do not audit attempts to get the attributes
of all named pipes with a filesystem type.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_getattr_all_sockets" lineno="6887">
<summary>
Get the attributes of all named sockets with
a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_getattr_all_sockets" lineno="6906">
<summary>
Do not audit attempts to get the attributes
of all named sockets with a filesystem type.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_getattr_all_blk_files" lineno="6925">
<summary>
Get the attributes of all block device nodes with
a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_getattr_all_chr_files" lineno="6944">
<summary>
Get the attributes of all character device nodes with
a filesystem type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unconfined" lineno="6962">
<summary>
Unconfined access to filesystems
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_dontaudit_leaks" lineno="6981">
<summary>
Do not audit attempts to read or write
all leaked filesystems files.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="fs_tmpfs_filetrans_named_content" lineno="7001">
<summary>
Transition named content in tmpfs_t directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_read_efivarfs_files" lineno="7024">
<summary>
Read files in efivarfs
- contains Linux Kernel configuration options for UEFI systems
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_manage_efivarfs_files" lineno="7043">
<summary>
Manage efivarfs files
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_search_efivarfs_dirs" lineno="7061">
<summary>
Search efivarfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_setattr_efivarfs_files" lineno="7080">
<summary>
Set the attributes of efivarfs files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_onload_sockets" lineno="7099">
<summary>
Read and write sockets of ONLOAD file system pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_search_tracefs_dirs" lineno="7120">
<summary>
Search tracefs_t directories
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_rw_tracefs_files" lineno="7138">
<summary>
Read and write tracefs_t files
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_manage_tracefs_dirs" lineno="7158">
<summary>
Create, read, write, and delete dirs
labeled as tracefs_t.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="fs_mount_tracefs" lineno="7176">
<summary>
Mount tracefs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_remount_tracefs" lineno="7194">
<summary>
Remount tracefs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="fs_unmount_tracefs" lineno="7212">
<summary>
Unmount tracefs filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
</module>
<module name="kernel" filename="policy/modules/kernel/kernel.if">
<summary>
Policy for kernel threads, proc filesystem,
and unlabeled processes and objects.
</summary>
<required val="true">
This module has initial SIDs.
</required>
<interface name="kernel_domtrans_to" lineno="25">
<summary>
Allows to start userland processes
by transitioning to the specified domain.
</summary>
<param name="domain">
<summary>
The process type entered by kernel.
</summary>
</param>
<param name="entrypoint">
<summary>
The executable type for the entrypoint.
</summary>
</param>
</interface>
<interface name="kernel_ranged_domtrans_to" lineno="55">
<summary>
Allows to start userland processes
by transitioning to the specified domain,
with a range transition.
</summary>
<param name="domain">
<summary>
The process type entered by kernel.
</summary>
</param>
<param name="entrypoint">
<summary>
The executable type for the entrypoint.
</summary>
</param>
<param name="range">
<summary>
Range for the domain.
</summary>
</param>
</interface>
<interface name="kernel_rootfs_mountpoint" lineno="83">
<summary>
Allows the kernel to mount filesystems on
the specified directory type.
</summary>
<param name="directory_type">
<summary>
The type of the directory to use as a mountpoint.
</summary>
</param>
</interface>
<interface name="kernel_setpgid" lineno="101">
<summary>
Set the process group of kernel threads.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_setsched" lineno="119">
<summary>
Set the priority of kernel threads.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_setsched" lineno="137">
<summary>
Dontaudit attempts to set the priority of kernel threads.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_getsched" lineno="155">
<summary>
Get scheduling policy and attributes of kernel threads.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_sigchld" lineno="173">
<summary>
Send a SIGCHLD signal to kernel threads.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_kill" lineno="191">
<summary>
Send a kill signal to kernel threads.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_signal" lineno="209">
<summary>
Send a generic signal to kernel threads.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_signull" lineno="227">
<summary>
Send signull to kernel threads.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_share_state" lineno="246">
<summary>
Allows the kernel to share state information with
the caller.
</summary>
<param name="domain">
<summary>
The type of the process with which to share state information.
</summary>
</param>
</interface>
<interface name="kernel_use_fds" lineno="264">
<summary>
Permits caller to use kernel file descriptors.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_use_fds" lineno="283">
<summary>
Do not audit attempts to use
kernel file descriptors.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_rw_pipes" lineno="301">
<summary>
Read and write kernel unnamed pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_stream_connect" lineno="320">
<summary>
Connect to kernel using a unix
domain stream socket.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_unix_dgram_sockets" lineno="338">
<summary>
Read and write kernel unix datagram sockets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dgram_send" lineno="356">
<summary>
Send messages to kernel unix datagram sockets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_tcp_recvfrom" lineno="374">
<summary>
Receive messages from kernel TCP sockets. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_udp_send" lineno="388">
<summary>
Send UDP network traffic to the kernel. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_udp_recvfrom" lineno="402">
<summary>
Receive messages from kernel UDP sockets. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_load_module" lineno="416">
<summary>
Allows caller to load kernel modules
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_load_unsigned_module" lineno="434">
<summary>
Allows caller to load unsigned kernel modules
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_search_key" lineno="448">
<summary>
Allow search the kernel key ring.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_search_key" lineno="466">
<summary>
dontaudit search the kernel key ring.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_link_key" lineno="484">
<summary>
Allow link to the kernel key ring.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_link_key" lineno="502">
<summary>
dontaudit link to the kernel key ring.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_rw_key" lineno="520">
<summary>
Allow read, view, and write the kernel key ring.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_key" lineno="538">
<summary>
Allow read the kernel key ring.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_view_key" lineno="556">
<summary>
Allow view the kernel key ring.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_view_key" lineno="574">
<summary>
dontaudit view the kernel key ring.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_ring_buffer" lineno="592">
<summary>
Allows caller to read the ring buffer.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_dontaudit_read_ring_buffer" lineno="611">
<summary>
Do not audit attempts to read the ring buffer.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_change_ring_buffer_level" lineno="630">
<summary>
Change the level of kernel messages logged to the console.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_clear_ring_buffer" lineno="658">
<summary>
Allows the caller to clear the ring buffer.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_request_load_module" lineno="698">
<summary>
Allows caller to request the kernel to load a module
</summary>
<desc>
<p>
Allow the specified domain to request that the kernel
load a kernel module. An example of this is the
auto-loading of network drivers when doing an
ioctl() on a network interface.
</p>
<p>
In the specific case of a module loading request
on a network interface, the domain will also
need the net_admin capability.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_request_load_module" lineno="716">
<summary>
Do not audit requests to the kernel to load a module.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_get_sysvipc_info" lineno="734">
<summary>
Get information on all System V IPC objects.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_getattr_debugfs" lineno="752">
<summary>
Get the attributes of a kernel debugging filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mount_debugfs" lineno="770">
<summary>
Mount a kernel debugging filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_unmount_debugfs" lineno="788">
<summary>
Unmount a kernel debugging filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_remount_debugfs" lineno="806">
<summary>
Remount a kernel debugging filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_search_debugfs" lineno="824">
<summary>
Search the contents of a kernel debugging filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_search_debugfs" lineno="842">
<summary>
Do not audit attempts to search the kernel debugging filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_debugfs" lineno="860">
<summary>
Read information from the debugging filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_write_debugfs_dirs" lineno="880">
<summary>
Do not audit attempts to write kernel debugging filesystem dirs.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_manage_debugfs" lineno="898">
<summary>
Manage information from the debugging filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mount_kvmfs" lineno="918">
<summary>
Mount a kernel VM filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mount_proc" lineno="936">
<summary>
Mount the proc filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_unmount_proc" lineno="954">
<summary>
Unmount the proc filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mounton_proc" lineno="972">
<summary>
Mounton a proc filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_getattr_proc" lineno="990">
<summary>
Get the attributes of the proc filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_setattr_proc_dirs" lineno="1009">
<summary>
Do not audit attempts to set the
attributes of directories in /proc.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_setattr_proc_files" lineno="1028">
<summary>
Do not audit attempts to set the
attributes of files in /proc.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_search_proc" lineno="1046">
<summary>
Search directories in /proc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_list_proc" lineno="1064">
<summary>
List the contents of directories in /proc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_list_proc" lineno="1083">
<summary>
Do not audit attempts to list the
contents of directories in /proc.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_write_proc_dirs" lineno="1102">
<summary>
Do not audit attempts to write the
directories in /proc.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_getattr_proc_files" lineno="1120">
<summary>
Get the attributes of files in /proc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_proc_files" lineno="1138">
<summary>
Read generic files in /proc.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_proc_symlinks" lineno="1165">
<summary>
Read generic symbolic links in /proc.
</summary>
<desc>
<p>
Allow the specified domain to read (follow) generic
symbolic links (symlinks) in the proc filesystem (/proc).
This interface does not include access to the targets of
these links. An example symlink is /proc/self.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="kernel_read_system_state" lineno="1204">
<summary>
Allows caller to read system state information in /proc.
</summary>
<desc>
<p>
Allow the specified domain to read general system
state information from the proc filesystem (/proc).
</p>
<p>
Generally it should be safe to allow this access. Some
example files that can be read based on this interface:
</p>
<ul>
<li>/proc/cpuinfo</li>
<li>/proc/meminfo</li>
<li>/proc/uptime</li>
</ul>
<p>
This does not allow access to sysctl entries (/proc/sys/*)
nor process state information (/proc/pid).
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
<rolecap/>
</interface>
<interface name="kernel_write_proc_files" lineno="1227">
<summary>
Write to generic proc entries.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_dontaudit_write_proc_files" lineno="1246">
<summary>
Do not audit attempts to write the
file in /proc.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_access_check_proc" lineno="1265">
<summary>
Do not audit attempts to check the
access on generic proc entries.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_read_system_state" lineno="1284">
<summary>
Do not audit attempts by caller to
read system state information in proc.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_read_proc_symlinks" lineno="1303">
<summary>
Do not audit attempts by caller to
read system state information in proc.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_afs_state" lineno="1322">
<summary>
Allow caller to read state information for AFS.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_afs_state" lineno="1342">
<summary>
Allow caller to read and write state information for AFS.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_read_software_raid_state" lineno="1362">
<summary>
Allow caller to read the state information for software raid.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_software_raid_state" lineno="1382">
<summary>
Allow caller to read and set the state information for software raid.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_getattr_core_if" lineno="1402">
<summary>
Allows caller to get attribues of core kernel interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_getattr_core_if" lineno="1423">
<summary>
Do not audit attempts to get the attributes of
core kernel interfaces.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_core_if" lineno="1441">
<summary>
Allows caller to read the core kernel interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mounton_core_if" lineno="1464">
<summary>
Allow caller to mounton the kernel messages file
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_messages" lineno="1483">
<summary>
Allow caller to read kernel messages
using the /proc/kmsg interface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mounton_messages" lineno="1504">
<summary>
Allow caller to mounton the kernel messages file
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_getattr_message_if" lineno="1523">
<summary>
Allow caller to get the attributes of kernel message
interface (/proc/kmsg).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_getattr_message_if" lineno="1542">
<summary>
Do not audit attempts by caller to get the attributes of kernel
message interfaces.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_search_network_state" lineno="1562">
<summary>
Do not audit attempts to search the network
state directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_search_network_state" lineno="1581">
<summary>
Allow searching of network state directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_network_state" lineno="1611">
<summary>
Read the network state information.
</summary>
<desc>
<p>
Allow the specified domain to read the networking
state information. This includes several pieces
of networking information, such as network interface
names, netfilter (iptables) statistics, protocol
information, routes, and remote procedure call (RPC)
information.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
<rolecap/>
</interface>
<interface name="kernel_read_network_state_symlinks" lineno="1632">
<summary>
Allow caller to read the network state symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_search_xen_state" lineno="1653">
<summary>
Allow searching of xen state directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_search_xen_state" lineno="1673">
<summary>
Do not audit attempts to search the xen
state directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_xen_state" lineno="1692">
<summary>
Allow caller to read the xen state information.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_xen_state_symlinks" lineno="1714">
<summary>
Allow caller to read the xen state symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_write_xen_state" lineno="1735">
<summary>
Allow caller to write xen state information.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_list_all_proc" lineno="1753">
<summary>
Allow attempts to list all proc directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mounton_all_proc" lineno="1772">
<summary>
Allow attempts to mounton all proc directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_list_all_proc" lineno="1791">
<summary>
Do not audit attempts to list all proc directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_all_proc" lineno="1810">
<summary>
Allow attempts to read all proc types.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_search_sysctl" lineno="1834">
<summary>
Do not audit attempts by caller to search
the base directory of sysctls.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_sysctl" lineno="1853">
<summary>
Allow access to read sysctl directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_device_sysctls" lineno="1873">
<summary>
Allow caller to read the device sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_device_sysctls" lineno="1894">
<summary>
Read and write device sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_search_vm_sysctl" lineno="1914">
<summary>
Allow caller to search virtual memory sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_vm_sysctls" lineno="1933">
<summary>
Allow caller to read virtual memory sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_vm_sysctls" lineno="1954">
<summary>
Read and write virtual memory sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_search_network_sysctl" lineno="1976">
<summary>
Search network sysctl directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_search_network_sysctl" lineno="1994">
<summary>
Do not audit attempts by caller to search network sysctl directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_net_sysctls" lineno="2013">
<summary>
Allow caller to read network sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_net_sysctls" lineno="2034">
<summary>
Allow caller to modiry contents of sysctl network files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_read_unix_sysctls" lineno="2056">
<summary>
Allow caller to read unix domain
socket sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_unix_sysctls" lineno="2077">
<summary>
Read and write unix domain
socket sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_read_hotplug_sysctls" lineno="2097">
<summary>
Read the hotplug sysctl.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_hotplug_sysctls" lineno="2111">
<summary>
Read and write the hotplug sysctl.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_modprobe_sysctls" lineno="2125">
<summary>
Read the modprobe sysctl.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_modprobe_sysctls" lineno="2139">
<summary>
Read and write the modprobe sysctl.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mounton_kernel_sysctl" lineno="2153">
<summary>
Allow mounton generic kernel sysctls.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_search_kernel_sysctl" lineno="2172">
<summary>
Do not audit attempts to search generic kernel sysctls.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_crypto_sysctls" lineno="2190">
<summary>
Read generic crypto sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_kernel_sysctls" lineno="2231">
<summary>
Read general kernel sysctls.
</summary>
<desc>
<p>
Allow the specified domain to read general
kernel sysctl settings. These settings are typically
read using the sysctl program. The settings
that are included by this interface are prefixed
with "kernel.", for example, kernel.sysrq.
</p>
<p>
This does not include access to the hotplug
handler setting (kernel.hotplug)
nor the module installer handler setting
(kernel.modprobe).
</p>
<p>
Related interfaces:
</p>
<ul>
<li>kernel_rw_kernel_sysctl()</li>
</ul>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
</interface>
<interface name="kernel_dontaudit_write_kernel_sysctl" lineno="2251">
<summary>
Do not audit attempts to write generic kernel sysctls.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_rw_kernel_sysctl" lineno="2270">
<summary>
Read and write generic kernel sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_read_kernel_ns_lastpid_sysctls" lineno="2291">
<summary>
Read kernel ns lastpid sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_dontaudit_write_kernel_ns_lastpid_sysctl" lineno="2311">
<summary>
Do not audit attempts to write kernel ns lastpid sysctls.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_rw_kernel_ns_lastpid_sysctl" lineno="2330">
<summary>
Read and write kernel ns lastpid sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_read_fs_sysctls" lineno="2351">
<summary>
Read filesystem sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_fs_sysctls" lineno="2372">
<summary>
Read and write fileystem sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_dontaudit_search_fs_sysctl" lineno="2392">
<summary>
Do not audit attempts to search filesystem sysctl directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_irq_sysctls" lineno="2411">
<summary>
Read IRQ sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_irq_sysctls" lineno="2432">
<summary>
Read and write IRQ sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_read_rpc_sysctls" lineno="2453">
<summary>
Read RPC sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_rpc_sysctls_dirs" lineno="2475">
<summary>
Read RPC sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_rpc_sysctls" lineno="2494">
<summary>
Read and write RPC sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_create_rpc_sysctls" lineno="2515">
<summary>
Read and write RPC sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_dontaudit_list_all_sysctls" lineno="2534">
<summary>
Do not audit attempts to list all sysctl directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_mounton_all_sysctls" lineno="2553">
<summary>
Allow attempts to mounton all sysctl directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mounton_systemd_ProtectKernelTunables" lineno="2571">
<summary>
Allow attempts to mounton all filesystems used by ProtectKernelTunables systemd feature.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_getattr_all_sysctls" lineno="2600">
<summary>
Get the attributes of all sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_all_sysctls" lineno="2619">
<summary>
Allow caller to read all sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_all_sysctls" lineno="2642">
<summary>
Read and write all sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_kill_unlabeled" lineno="2666">
<summary>
Send a kill signal to unlabeled processes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_mount_unlabeled" lineno="2684">
<summary>
Mount a kernel unlabeled filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_unmount_unlabeled" lineno="2702">
<summary>
Unmount a kernel unlabeled filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_signal_unlabeled" lineno="2720">
<summary>
Send general signals to unlabeled processes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_signull_unlabeled" lineno="2738">
<summary>
Send a null signal to unlabeled processes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_sigstop_unlabeled" lineno="2756">
<summary>
Send a stop signal to unlabeled processes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_sigchld_unlabeled" lineno="2774">
<summary>
Send a child terminated signal to unlabeled processes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_list_unlabeled" lineno="2792">
<summary>
List unlabeled directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_delete_unlabeled" lineno="2810">
<summary>
Delete unlabeled files
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_unlabeled_state" lineno="2829">
<summary>
Read the process state (/proc/pid) of all unlabeled_t.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_list_unlabeled" lineno="2849">
<summary>
Do not audit attempts to list unlabeled directories.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_rw_unlabeled_dirs" lineno="2867">
<summary>
Read and write unlabeled directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_unlabeled_files" lineno="2885">
<summary>
Read and write unlabeled files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_watch_unlabeled_dirs" lineno="2903">
<summary>
Watch unlabeled directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_getattr_unlabeled_files" lineno="2922">
<summary>
Do not audit attempts by caller to get the
attributes of an unlabeled file.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_read_unlabeled_files" lineno="2941">
<summary>
Do not audit attempts by caller to
read an unlabeled file.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_getattr_unlabeled_symlinks" lineno="2960">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled symbolic links.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_getattr_unlabeled_pipes" lineno="2979">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named pipes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_getattr_unlabeled_sockets" lineno="2998">
<summary>
Do not audit attempts by caller to get the
attributes of unlabeled named sockets.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_getattr_unlabeled_blk_files" lineno="3017">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled block devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_unlabeled_lnk_files" lineno="3035">
<summary>
Read unlabeled symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_unlabeled_blk_files" lineno="3053">
<summary>
Read and write unlabeled block device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_unlabeled_socket" lineno="3071">
<summary>
Read and write unlabeled sockets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_getattr_unlabeled_chr_files" lineno="3090">
<summary>
Do not audit attempts by caller to get attributes for
unlabeled character devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_relabelfrom_unlabeled_dirs" lineno="3108">
<summary>
Allow caller to relabel unlabeled directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_relabelfrom_unlabeled_fs" lineno="3126">
<summary>
Allow caller to relabel unlabeled filesystems.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_relabelfrom_unlabeled_files" lineno="3144">
<summary>
Allow caller to relabel unlabeled files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_relabelfrom_unlabeled_symlinks" lineno="3163">
<summary>
Allow caller to relabel unlabeled symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_relabelfrom_unlabeled_pipes" lineno="3182">
<summary>
Allow caller to relabel unlabeled named pipes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_relabelfrom_unlabeled_sockets" lineno="3201">
<summary>
Allow caller to relabel unlabeled named sockets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_sendrecv_unlabeled_association" lineno="3235">
<summary>
Send and receive messages from an
unlabeled IPSEC association.
</summary>
<desc>
<p>
Send and receive messages from an
unlabeled IPSEC association. Network
connections that are not protected
by IPSEC have use an unlabeled
assocation.
</p>
<p>
The corenetwork interface
corenet_non_ipsec_sendrecv() should
be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_sendrecv_unlabeled_association" lineno="3268">
<summary>
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association.
</summary>
<desc>
<p>
Do not audit attempts to send and receive messages
from an unlabeled IPSEC association. Network
connections that are not protected
by IPSEC have use an unlabeled
assocation.
</p>
<p>
The corenetwork interface
corenet_dontaudit_non_ipsec_sendrecv() should
be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dccp_recvfrom_unlabeled" lineno="3286">
<summary>
Receive DCCP packets from an unlabeled connection.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_tcp_recvfrom_unlabeled" lineno="3313">
<summary>
Receive TCP packets from an unlabeled connection.
</summary>
<desc>
<p>
Receive TCP packets from an unlabeled connection.
</p>
<p>
The corenetwork interface corenet_tcp_recv_unlabeled() should
be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_dccp_recvfrom_unlabeled" lineno="3332">
<summary>
Do not audit attempts to receive DCCP packets from an unlabeled
connection.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_tcp_recvfrom_unlabeled" lineno="3361">
<summary>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
</summary>
<desc>
<p>
Do not audit attempts to receive TCP packets from an unlabeled
connection.
</p>
<p>
The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled()
should be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_udp_recvfrom_unlabeled" lineno="3388">
<summary>
Receive UDP packets from an unlabeled connection.
</summary>
<desc>
<p>
Receive UDP packets from an unlabeled connection.
</p>
<p>
The corenetwork interface corenet_udp_recv_unlabeled() should
be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_udp_recvfrom_unlabeled" lineno="3417">
<summary>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
</summary>
<desc>
<p>
Do not audit attempts to receive UDP packets from an unlabeled
connection.
</p>
<p>
The corenetwork interface corenet_dontaudit_udp_recv_unlabeled()
should be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_raw_recvfrom_unlabeled" lineno="3444">
<summary>
Receive Raw IP packets from an unlabeled connection.
</summary>
<desc>
<p>
Receive Raw IP packets from an unlabeled connection.
</p>
<p>
The corenetwork interface corenet_raw_recv_unlabeled() should
be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_unlabeled_rawip_socket" lineno="3470">
<summary>
Read/Write Raw IP packets from an unlabeled connection.
</summary>
<desc>
<p>
Receive Raw IP packets from an unlabeled connection.
</p>
<p>
The corenetwork interface corenet_raw_recv_unlabeled() should
be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_unlabeled_smc_socket" lineno="3493">
<summary>
Read/Write smc packets from an unlabeled connection.
</summary>
<desc>
<p>
Receive smc packets from an unlabeled connection.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_unlabeled_vsock_socket" lineno="3516">
<summary>
Read/Write vsock packets from an unlabeled connection.
</summary>
<desc>
<p>
Receive vsock packets from an unlabeled connection.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_raw_recvfrom_unlabeled" lineno="3545">
<summary>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
</summary>
<desc>
<p>
Do not audit attempts to receive Raw IP packets from an unlabeled
connection.
</p>
<p>
The corenetwork interface corenet_dontaudit_raw_recv_unlabeled()
should be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_sendrecv_unlabeled_packets" lineno="3575">
<summary>
Send and receive unlabeled packets.
</summary>
<desc>
<p>
Send and receive unlabeled packets.
These packets do not match any netfilter
SECMARK rules.
</p>
<p>
The corenetwork interface
corenet_sendrecv_unlabeled_packets() should
be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_recvfrom_unlabeled_peer" lineno="3603">
<summary>
Receive packets from an unlabeled peer.
</summary>
<desc>
<p>
Receive packets from an unlabeled peer, these packets do not have any
peer labeling information present.
</p>
<p>
The corenetwork interface corenet_recvfrom_unlabeled_peer() should
be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_recvfrom_unlabeled_peer" lineno="3631">
<summary>
Do not audit attempts to receive packets from an unlabeled peer.
</summary>
<desc>
<p>
Do not audit attempts to receive packets from an unlabeled peer,
these packets do not have any peer labeling information present.
</p>
<p>
The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled()
should be used instead of this one.
</p>
</desc>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_relabelfrom_unlabeled_database" lineno="3649">
<summary>
Relabel from unlabeled database objects.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_relabelto_unlabeled" lineno="3686">
<summary>
Relabel to unlabeled context .
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_unconfined" lineno="3704">
<summary>
Unconfined access to kernel module resources.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_stream_read" lineno="3724">
<summary>
Allow the specified domain to getattr on
the kernel with a unix socket.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_stream_write" lineno="3743">
<summary>
Allow the specified domain to write on
the kernel with a unix socket.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_stream_socket_perms" lineno="3762">
<summary>
Allow the specified domain to read/write on
the kernel with a unix stream socket.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_ioctl_stream_sockets" lineno="3782">
<summary>
Allow the specified domain to ioctl a
kernel with a unix domain stream sockets.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_proc_type" lineno="3800">
<summary>
Make the specified type usable for regular entries in proc
</summary>
<param name="type">
<summary>
Type to be used for /proc entries.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_getattr_all_sysctls" lineno="3818">
<summary>
Do not audit attempts by caller to get attributes on all sysctls.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_state" lineno="3836">
<summary>
Read the process state (/proc/pid) of the kernel.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_read_state" lineno="3856">
<summary>
Dontaudit attempts to read the process state (/proc/pid) of the kernel.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_search_numa_state" lineno="3877">
<summary>
Allow searching of numa state directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_search_numa_state" lineno="3897">
<summary>
Do not audit attempts to search the numa
state directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_read_numa_state" lineno="3916">
<summary>
Allow caller to read the numa state information.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_numa_state_symlinks" lineno="3938">
<summary>
Allow caller to read the numa state symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_write_numa_state" lineno="3959">
<summary>
Allow caller to write numa state information.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_search_vm_overcommit_sysctl" lineno="3977">
<summary>
Allow caller to search virtual memory overcommit sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_vm_overcommit_sysctls" lineno="3997">
<summary>
Allow caller to read virtual memory overcommit sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_rw_vm_overcommit_sysctls" lineno="4017">
<summary>
Read and write virtual memory overcommit sysctls.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_dontaudit_search_security_state" lineno="4039">
<summary>
Do not audit attempts to search the security
state directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_search_security_state" lineno="4058">
<summary>
Allow searching of security state directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_security_state" lineno="4084">
<summary>
Read the security state information.
</summary>
<desc>
<p>
Allow the specified domain to read the security
state information.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
<rolecap/>
</interface>
<interface name="kernel_write_security_state" lineno="4115">
<summary>
Write the security state information.
</summary>
<desc>
<p>
Allow the specified domain to write the security
state information.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="write" weight="10"/>
<rolecap/>
</interface>
<interface name="kernel_read_security_state_symlinks" lineno="4133">
<summary>
Allow caller to read the security state symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_ib_access_unlabeled_pkeys" lineno="4153">
<summary>
Access unlabeled infiniband pkeys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_ib_manage_subnet_unlabeled_endports" lineno="4171">
<summary>
Manage subnet on unlabeled Infiniband endports.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_security_state" lineno="4189">
<summary>
Allow caller to read the security state symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_dontaudit_search_usermodehelper_state" lineno="4211">
<summary>
Do not audit attempts to search the usermodehelper
state directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="kernel_search_usermodehelper_state" lineno="4230">
<summary>
Allow searching of usermodehelper state directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_usermodehelper_state" lineno="4260">
<summary>
Read the usermodehelper state information.
</summary>
<desc>
<p>
Allow the specified domain to read the usermodehelpering
state information. This includes several pieces
of usermodehelpering information, such as usermodehelper interface
names, usermodehelperfilter (iptables) statistics, protocol
information, routes, and remote procedure call (RPC)
information.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<infoflow type="read" weight="10"/>
<rolecap/>
</interface>
<interface name="kernel_read_usermodehelper_state_symlinks" lineno="4281">
<summary>
Allow caller to read the usermodehelper state symbolic links.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_rw_usermodehelper_state" lineno="4302">
<summary>
Read and write usermodehelper state
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_dontaudit_write_usermodehelper_state" lineno="4323">
<summary>
Dontaudit write usermodehelper state
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<rolecap/>
</interface>
<interface name="kernel_relabelto_usermodehelper" lineno="4341">
<summary>
Relabel to usermodehelper context .
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_relabelfrom_usermodehelper" lineno="4359">
<summary>
Relabel from usermodehelper context .
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_read_netlink_audit_socket" lineno="4377">
<summary>
Read netlink audit socket
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_unlabeled_domtrans" lineno="4400">
<summary>
Execute an unlabeled file in the specified domain.
</summary>
<param name="domain">
<summary>
Domain allowed to transition.
</summary>
</param>
<param name="target_domain">
<summary>
The type of the new process.
</summary>
</param>
</interface>
<interface name="kernel_unlabeled_entry_type" lineno="4421">
<summary>
Make general progams without labeles an entrypoint for
the specified domain.
</summary>
<param name="domain">
<summary>
The domain for which unlabeled_t is an entrypoint.
</summary>
</param>
</interface>
<interface name="kernel_kexec_load" lineno="4440">
<summary>
Allow the caller load a new kernel
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_write_perf_event" lineno="4454">
<summary>
Allow the caller write perf_event
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_manage_perf_event" lineno="4473">
<summary>
Allow the caller manage perf_event
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="kernel_prog_run_bpf" lineno="4489">
<summary>
Allow caller domain to run bpf.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<bool name="secure_mode_insmod" dftval="false">
<desc>
<p>
Disable kernel module loading.
</p>
</desc>
</bool>
</module>
<module name="mcs" filename="policy/modules/kernel/mcs.if">
<summary>Multicategory security policy</summary>
<required val="true">
Contains attributes used in MCS policy.
</required>
<interface name="mcs_constrained" lineno="26">
<summary>
Constrain by category access control (MCS).
</summary>
<desc>
<p>
Constrain the specified type by category based
access control (MCS) This prevents this domain from
interacting with subjects and operating on objects
that it otherwise would be able to interact
with or operate on respectively.
</p>
</desc>
<param name="domain">
<summary>
Type to be constrained by MCS.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="mcs_file_read_all" lineno="46">
<summary>
This domain is allowed to read files and directories
regardless of their MCS category set.
</summary>
<param name="domain">
<summary>
Domain target for user exemption.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mcs_file_write_all" lineno="62">
<summary>
This domain is allowed to write files and directories
regardless of their MCS category set.
</summary>
<param name="domain">
<summary>
Domain target for user exemption.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mcs_killall" lineno="78">
<summary>
This domain is allowed to sigkill and sigstop
all domains regardless of their MCS category set.
</summary>
<param name="domain">
<summary>
Domain target for user exemption.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mcs_ptrace_all" lineno="94">
<summary>
This domain is allowed to ptrace
all domains regardless of their MCS
category set.
</summary>
<param name="domain">
<summary>
Domain target for user exemption.
</summary>
</param>
</interface>
<interface name="mcs_process_set_categories" lineno="110">
<summary>
Make specified domain MCS trusted
for setting any category set for
the processes it executes.
</summary>
<param name="domain">
<summary>
Domain target for user exemption.
</summary>
</param>
</interface>
<interface name="mcs_socket_write_all_levels" lineno="130">
<summary>
Make specified domain MCS trusted
for writing to sockets at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
</module>
<module name="mls" filename="policy/modules/kernel/mls.if">
<summary>Multilevel security policy</summary>
<desc>
<p>
This module contains interfaces for handling multilevel
security. The interfaces allow the specified subjects
and objects to be allowed certain privileges in the
MLS rules.
</p>
</desc>
<required val="true">
Contains attributes used in MLS policy.
</required>
<interface name="mls_file_read_to_clearance" lineno="26">
<summary>
Make specified domain MLS trusted
for reading from files up to its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_file_read_up" lineno="55">
<summary>
Make specified domain MLS trusted
for reading from files at all levels. (Deprecated)
</summary>
<desc>
<p>
Make specified domain MLS trusted
for reading from files at all levels.
</p>
<p>
This interface has been deprecated, please use
mls_file_read_all_levels() instead.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="mls_file_read_all_levels" lineno="72">
<summary>
Make specified domain MLS trusted
for reading from files at all levels.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_file_write_to_clearance" lineno="92">
<summary>
Make specified domain MLS trusted
for write to files up to its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_file_relabel_to_clearance" lineno="112">
<summary>
Make specified domain MLS trusted
for relabelto to files up to its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_file_write_down" lineno="141">
<summary>
Make specified domain MLS trusted
for writing to files at all levels. (Deprecated)
</summary>
<desc>
<p>
Make specified domain MLS trusted
for writing to files at all levels.
</p>
<p>
This interface has been deprecated, please use
mls_file_write_all_levels() instead.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="mls_file_write_all_levels" lineno="158">
<summary>
Make specified domain MLS trusted
for writing to files at all levels.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_file_upgrade" lineno="178">
<summary>
Make specified domain MLS trusted
for raising the level of files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_file_downgrade" lineno="198">
<summary>
Make specified domain MLS trusted
for lowering the level of files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_file_write_within_range" lineno="220">
<summary>
Make specified domain trusted to
be written to within its MLS range.
The subject's MLS range must be a
proper subset of the object's MLS range.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_socket_read_all_levels" lineno="240">
<summary>
Make specified domain MLS trusted
for reading from sockets at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_socket_read_to_clearance" lineno="261">
<summary>
Make specified domain MLS trusted
for reading from sockets at any level
that is dominated by the process clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_socket_write_to_clearance" lineno="282">
<summary>
Make specified domain MLS trusted
for writing to sockets up to
its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_socket_write_all_levels" lineno="302">
<summary>
Make specified domain MLS trusted
for writing to sockets at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_net_receive_all_levels" lineno="323">
<summary>
Make specified domain MLS trusted
for receiving network data from
network interfaces or hosts at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_net_write_within_range" lineno="345">
<summary>
Make specified domain trusted to
write to network objects within its MLS range.
The subject's MLS range must be a
proper subset of the object's MLS range.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_net_inbound_all_levels" lineno="366">
<summary>
Make specified domain trusted to
write inbound packets regardless of the
network's or node's MLS range.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_net_outbound_all_levels" lineno="387">
<summary>
Make specified domain trusted to
write outbound packets regardless of the
network's or node's MLS range.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_sysvipc_read_to_clearance" lineno="408">
<summary>
Make specified domain MLS trusted
for reading from System V IPC objects
up to its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_sysvipc_read_all_levels" lineno="429">
<summary>
Make specified domain MLS trusted
for reading from System V IPC objects
at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_sysvipc_write_to_clearance" lineno="450">
<summary>
Make specified domain MLS trusted
for writing to System V IPC objects
up to its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_sysvipc_write_all_levels" lineno="471">
<summary>
Make specified domain MLS trusted
for writing to System V IPC objects
at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_rangetrans_source" lineno="491">
<summary>
Allow the specified domain to do a MLS
range transition that changes
the current level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="mls_rangetrans_target" lineno="511">
<summary>
Make specified domain a target domain
for MLS range transitions that change
the current level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="mls_process_read_to_clearance" lineno="532">
<summary>
Make specified domain MLS trusted
for reading from processes up to
its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_process_read_up" lineno="561">
<summary>
Make specified domain MLS trusted
for reading from processes at all levels. (Deprecated)
</summary>
<desc>
<p>
Make specified domain MLS trusted
for reading from processes at all levels.
</p>
<p>
This interface has been deprecated, please use
mls_process_read_all_levels() instead.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="mls_process_read_all_levels" lineno="578">
<summary>
Make specified domain MLS trusted
for reading from processes at all levels.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_process_write_to_clearance" lineno="599">
<summary>
Make specified domain MLS trusted
for writing to processes up to
its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_process_write_down" lineno="628">
<summary>
Make specified domain MLS trusted
for writing to processes at all levels. (Deprecated)
</summary>
<desc>
<p>
Make specified domain MLS trusted
for writing to processes at all levels.
</p>
<p>
This interface has been deprecated, please use
mls_process_write_all_levels() instead.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="mls_process_write_all_levels" lineno="645">
<summary>
Make specified domain MLS trusted
for writing to processes at all levels.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_process_set_level" lineno="666">
<summary>
Make specified domain MLS trusted
for setting the level of processes
it executes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_xwin_read_to_clearance" lineno="686">
<summary>
Make specified domain MLS trusted
for reading from X objects up to its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_xwin_read_all_levels" lineno="706">
<summary>
Make specified domain MLS trusted
for reading from X objects at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_xwin_write_to_clearance" lineno="726">
<summary>
Make specified domain MLS trusted
for write to X objects up to its clearance.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_xwin_write_all_levels" lineno="746">
<summary>
Make specified domain MLS trusted
for writing to X objects at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_colormap_read_all_levels" lineno="766">
<summary>
Make specified domain MLS trusted
for reading from X colormaps at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_colormap_write_all_levels" lineno="786">
<summary>
Make specified domain MLS trusted
for writing to X colormaps at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_trusted_object" lineno="815">
<summary>
Make specified object MLS trusted.
</summary>
<desc>
<p>
Make specified object MLS trusted. This
allows all levels to read and write the
object.
</p>
<p>
This currently only applies to filesystem
objects, for example, files and directories.
</p>
</desc>
<param name="domain">
<summary>
The type of the object.
</summary>
</param>
</interface>
<interface name="mls_fd_use_all_levels" lineno="836">
<summary>
Make the specified domain trusted
to inherit and use file descriptors
from all levels.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_fd_share_all_levels" lineno="857">
<summary>
Make the file descriptors from the
specifed domain inheritable by
all levels.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_context_translate_all_levels" lineno="877">
<summary>
Make specified domain MLS trusted
for translating contexts at all levels.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_db_read_all_levels" lineno="897">
<summary>
Make specified domain MLS trusted
for reading from databases at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_db_write_all_levels" lineno="917">
<summary>
Make specified domain MLS trusted
for writing to databases at any level.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_db_upgrade" lineno="937">
<summary>
Make specified domain MLS trusted
for raising the level of databases.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_db_downgrade" lineno="957">
<summary>
Make specified domain MLS trusted
for lowering the level of databases.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_dbus_send_all_levels" lineno="977">
<summary>
Make specified domain MLS trusted
for sending dbus messages to
all levels.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="mls_dbus_recv_all_levels" lineno="998">
<summary>
Make specified domain MLS trusted
for receiving dbus messages from
all levels.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
</module>
<module name="selinux" filename="policy/modules/kernel/selinux.if">
<summary>
Policy for kernel security interface, in particular, selinuxfs.
</summary>
<required val="true">
Contains the policy for the kernel SELinux security interface.
</required>
<interface name="selinux_labeled_boolean" lineno="34">
<summary>
Make the specified type used for labeling SELinux Booleans.
This interface is only usable in the base module.
</summary>
<desc>
<p>
Make the specified type used for labeling SELinux Booleans.
</p>
<p>
This makes use of genfscon statements, which are only
available in the base module. Thus any module which calls this
interface must be included in the base module.
</p>
</desc>
<param name="type">
<summary>
Type used for labeling a Boolean.
</summary>
</param>
<param name="boolean">
<summary>
Name of the Boolean.
</summary>
</param>
</interface>
<interface name="selinux_get_fs_mount" lineno="56">
<summary>
Get the mountpoint of the selinuxfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_dontaudit_get_fs_mount" lineno="85">
<summary>
Do not audit attempts to get the mountpoint
of the selinuxfs filesystem.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="selinux_mount_fs" lineno="111">
<summary>
Mount the selinuxfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_remount_fs" lineno="133">
<summary>
Remount the selinuxfs filesystem.
This allows some mount options to be changed.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_unmount_fs" lineno="154">
<summary>
Unmount the selinuxfs filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_getattr_fs" lineno="175">
<summary>
Get the attributes of the selinuxfs filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_dontaudit_getattr_fs" lineno="195">
<summary>
Do not audit attempts to get the
attributes of the selinuxfs filesystem
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="selinux_dontaudit_getattr_dir" lineno="214">
<summary>
Do not audit attempts to get the
attributes of the selinuxfs directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="selinux_search_fs" lineno="232">
<summary>
Search selinuxfs.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_dontaudit_search_fs" lineno="256">
<summary>
Do not audit attempts to search selinuxfs.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="selinux_mounton_fs" lineno="274">
<summary>
Mount on selinuxfs directories.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_dontaudit_read_fs" lineno="297">
<summary>
Do not audit attempts to read
generic selinuxfs entries
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="selinux_get_enforce_mode" lineno="319">
<summary>
Allows the caller to get the mode of policy enforcement
(enforcing or permissive mode).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_set_enforce_mode" lineno="353">
<summary>
Allow caller to set the mode of policy enforcement
(enforcing or permissive mode).
</summary>
<desc>
<p>
Allow caller to set the mode of policy enforcement
(enforcing or permissive mode).
</p>
<p>
Since this is a security event, this action is
always audited.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_load_policy" lineno="375">
<summary>
Allow caller to load the policy into the kernel.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_read_policy" lineno="398">
<summary>
Allow caller to read the policy from the kernel.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_set_boolean" lineno="437">
<summary>
Allow caller to set the state of Booleans to
enable or disable conditional portions of the policy. (Deprecated)
</summary>
<desc>
<p>
Allow caller to set the state of Booleans to
enable or disable conditional portions of the policy.
</p>
<p>
Since this is a security event, this action is
always audited.
</p>
<p>
This interface has been deprecated. Please use
selinux_set_generic_booleans() or selinux_set_all_booleans()
instead.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_set_generic_booleans" lineno="464">
<summary>
Allow caller to set the state of generic Booleans to
enable or disable conditional portions of the policy.
</summary>
<desc>
<p>
Allow caller to set the state of generic Booleans to
enable or disable conditional portions of the policy.
</p>
<p>
Since this is a security event, this action is
always audited.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_set_all_booleans" lineno="500">
<summary>
Allow caller to set the state of all Booleans to
enable or disable conditional portions of the policy.
</summary>
<desc>
<p>
Allow caller to set the state of all Booleans to
enable or disable conditional portions of the policy.
</p>
<p>
Since this is a security event, this action is
always audited.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_set_parameters" lineno="538">
<summary>
Allow caller to set SELinux access vector cache parameters.
</summary>
<desc>
<p>
Allow caller to set SELinux access vector cache parameters.
The allows the domain to set performance related parameters
of the AVC, such as cache threshold.
</p>
<p>
Since this is a security event, this action is
always audited.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_validate_context" lineno="565">
<summary>
Allows caller to validate security contexts.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_dontaudit_validate_context" lineno="589">
<summary>
Do not audit attempts to validate security contexts.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_compute_access_vector" lineno="610">
<summary>
Allows caller to compute an access vector.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_compute_create_context" lineno="634">
<summary>
Calculate the default type for object creation.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="selinux_compute_member" lineno="658">
<summary>
Allows caller to compute polyinstatntiated
directory members.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_compute_relabel_context" lineno="690">
<summary>
Calculate the context for relabeling objects.
</summary>
<desc>
<p>
Calculate the context for relabeling objects.
This is determined by using the type_change
rules in the policy, and is generally used
for determining the context for relabeling
a terminal when a user logs in.
</p>
</desc>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_setcheckreqprot" lineno="713">
<summary>
Allows caller to setcheckreqprot
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_compute_user_contexts" lineno="736">
<summary>
Allows caller to compute possible contexts for a user.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_unconfined" lineno="759">
<summary>
Unconfined access to the SELinux kernel security server.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_genbool" lineno="781">
<summary>
Generate a file context for a boolean type
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="selinux_read_security_files" lineno="802">
<summary>
Allow caller to read security_t files.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<bool name="secure_mode_policyload" dftval="false">
<desc>
<p>
Boolean to determine whether the system permits loading policy, setting
enforcing mode, and changing boolean values. Set this to true and you
have to reboot to set it back.
</p>
</desc>
</bool>
</module>
<module name="storage" filename="policy/modules/kernel/storage.if">
<summary>Policy controlling access to storage devices</summary>
<interface name="storage_getattr_fixed_disk_dev" lineno="14">
<summary>
Allow the caller to get the attributes of fixed disk
device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_rw_inherited_fixed_disk_dev" lineno="34">
<summary>
Allow the caller to read/write inherited fixed disk
device nodes.
</summary>
<param name="domain">
<summary>
The domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_getattr_fixed_disk_dev" lineno="58">
<summary>
Do not audit attempts made by the caller to get
the attributes of fixed disk device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_setattr_fixed_disk_dev" lineno="78">
<summary>
Allow the caller to set the attributes of fixed disk
device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_setattr_fixed_disk_dev" lineno="98">
<summary>
Do not audit attempts made by the caller to set
the attributes of fixed disk device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_raw_read_fixed_disk" lineno="119">
<summary>
Allow the caller to directly read from a fixed disk.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_read_fixed_disk" lineno="144">
<summary>
Do not audit attempts made by the caller to read
fixed disk device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_raw_write_fixed_disk" lineno="167">
<summary>
Allow the caller to directly write to a fixed disk.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_write_fixed_disk" lineno="190">
<summary>
Do not audit attempts made by the caller to write
fixed disk device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_raw_rw_fixed_disk" lineno="212">
<summary>
Allow the caller to directly read and write to a fixed disk.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_watch_fixed_disk_dev" lineno="228">
<summary>
Allow the caller to watch fixed disk device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_create_fixed_disk_dev" lineno="247">
<summary>
Allow the caller to create fixed disk device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_delete_fixed_disk_dev" lineno="268">
<summary>
Allow the caller to create fixed disk device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_manage_fixed_disk" lineno="287">
<summary>
Create, read, write, and delete fixed disk device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dev_filetrans_fixed_disk" lineno="316">
<summary>
Create block devices in /dev with the fixed disk type
via an automatic type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<param name="filename" optional="true">
<summary>
Optional filename of the block device to be created
</summary>
</param>
</interface>
<interface name="storage_dev_filetrans_named_fixed_disk" lineno="335">
<summary>
Create block devices in /dev with the fixed disk type
via an automatic type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_tmpfs_filetrans_fixed_disk" lineno="377">
<summary>
Create block devices in on a tmpfs filesystem with the
fixed disk type via an automatic type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_tmp_filetrans_fixed_disk" lineno="396">
<summary>
Create block devices in on a tmp filesystem with the
fixed disk type via an automatic type transition.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_relabel_fixed_disk" lineno="414">
<summary>
Relabel fixed disk device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_swapon_fixed_disk" lineno="433">
<summary>
Enable a fixed disk device as swap space
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_getattr_fuse_dev" lineno="453">
<summary>
Allow the caller to get the attributes
of device nodes of fuse devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_rw_fuse" lineno="472">
<summary>
read or write fuse device interfaces.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_rw_fuse" lineno="491">
<summary>
Do not audit attempts to read or write
fuse device interfaces.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_getattr_scsi_generic_dev" lineno="510">
<summary>
Allow the caller to get the attributes of
the generic SCSI interface device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_setattr_scsi_generic_dev" lineno="530">
<summary>
Allow the caller to set the attributes of
the generic SCSI interface device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_read_scsi_generic" lineno="553">
<summary>
Allow the caller to directly read, in a
generic fashion, from any SCSI device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_write_scsi_generic" lineno="578">
<summary>
Allow the caller to directly write, in a
generic fashion, from any SCSI device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_rw_inherited_scsi_generic" lineno="604">
<summary>
Allow the caller to directly read and write, in a
generic fashion, from any SCSI device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_setattr_scsi_generic_dev_dev" lineno="629">
<summary>
Set attributes of the device nodes
for the SCSI generic inerface.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_rw_scsi_generic" lineno="649">
<summary>
Do not audit attempts to read or write
SCSI generic device interfaces.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_getattr_removable_dev" lineno="668">
<summary>
Allow the caller to get the attributes of removable
devices device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_getattr_removable_dev" lineno="688">
<summary>
Do not audit attempts made by the caller to get
the attributes of removable devices device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_read_removable_device" lineno="707">
<summary>
Do not audit attempts made by the caller to read
removable devices device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_write_removable_device" lineno="727">
<summary>
Do not audit attempts made by the caller to write
removable devices device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_setattr_removable_dev" lineno="746">
<summary>
Allow the caller to set the attributes of removable
devices device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_setattr_removable_dev" lineno="766">
<summary>
Do not audit attempts made by the caller to set
the attributes of removable devices device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_raw_read_removable_device" lineno="788">
<summary>
Allow the caller to directly read from
a removable device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_raw_read_removable_device" lineno="807">
<summary>
Do not audit attempts to directly read removable devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_raw_write_removable_device" lineno="829">
<summary>
Allow the caller to directly write to
a removable device.
This is extremly dangerous as it can bypass the
SELinux protections for filesystem objects, and
should only be used by trusted domains.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_dontaudit_raw_write_removable_device" lineno="848">
<summary>
Do not audit attempts to directly write removable devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_rw_inherited_removable_device" lineno="866">
<summary>
Alow read and write inherited removable devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="storage_read_tape" lineno="885">
<summary>
Allow the caller to directly read
a tape device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_write_tape" lineno="905">
<summary>
Allow the caller to directly read
a tape device.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_getattr_tape_dev" lineno="925">
<summary>
Allow the caller to get the attributes
of device nodes of tape devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_setattr_tape_dev" lineno="945">
<summary>
Allow the caller to set the attributes
of device nodes of tape devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_unconfined" lineno="964">
<summary>
Unconfined access to storage devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="storage_filetrans_all_named_dev" lineno="982">
<summary>
Create all named devices with the correct label
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
</module>
<module name="terminal" filename="policy/modules/kernel/terminal.if">
<summary>Policy for terminals.</summary>
<required val="true">
Depended on by other required modules.
</required>
<interface name="term_pty" lineno="16">
<summary>
Transform specified type into a pty type.
</summary>
<param name="pty_type">
<summary>
An object type that will applied to a pty.
</summary>
</param>
</interface>
<interface name="term_user_pty" lineno="45">
<summary>
Transform specified type into an user
pty type. This allows it to be relabeled via
type change by login programs such as ssh.
</summary>
<param name="userdomain">
<summary>
The type of the user domain associated with
this pty.
</summary>
</param>
<param name="object_type">
<summary>
An object type that will applied to a pty.
</summary>
</param>
</interface>
<interface name="term_login_pty" lineno="65">
<summary>
Transform specified type into a pty type
used by login programs, such as sshd.
</summary>
<param name="pty_type">
<summary>
An object type that will applied to a pty.
</summary>
</param>
</interface>
<interface name="term_tty" lineno="84">
<summary>
Transform specified type into a tty type.
</summary>
<param name="tty_type">
<summary>
An object type that will applied to a tty.
</summary>
</param>
</interface>
<interface name="term_user_tty" lineno="110">
<summary>
Transform specified type into a user tty type.
</summary>
<param name="domain">
<summary>
User domain that is related to this tty.
</summary>
</param>
<param name="tty_type">
<summary>
An object type that will applied to a tty.
</summary>
</param>
</interface>
<interface name="term_create_pty_dir" lineno="144">
<summary>
Create the /dev/pts directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_create_pty" lineno="168">
<summary>
Create a pty in the /dev/pts directory.
</summary>
<param name="domain">
<summary>
The type of the process creating the pty.
</summary>
</param>
<param name="pty_type">
<summary>
The type of the pty.
</summary>
</param>
</interface>
<interface name="term_write_all_terms" lineno="194">
<summary>
Write the console, all
ttys and all ptys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_use_all_terms" lineno="217">
<summary>
Read and write the console, all
ttys and all ptys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_use_all_inherited_terms" lineno="240">
<summary>
Read and write the inherited console, all inherited
ttys and ptys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_write_console" lineno="260">
<summary>
Write to the console.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_read_console" lineno="280">
<summary>
Read from the console.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_read_console" lineno="300">
<summary>
Do not audit attempts to read from the console.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_use_console" lineno="318">
<summary>
Read from and write to the console.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_dontaudit_use_console" lineno="338">
<summary>
Do not audit attemtps to read from
or write to the console.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_setattr_console" lineno="361">
<summary>
Set the attributes of the console
device node.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_relabel_console" lineno="380">
<summary>
Relabel from and to the console type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_create_console_dev" lineno="399">
<summary>
Create the console device (/dev/console).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_watch_console_dev" lineno="419">
<summary>
Watch the console device (/dev/console).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_watch_reads_console_dev" lineno="437">
<summary>
Watch_reads the console device (/dev/console).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_getattr_pty_fs" lineno="455">
<summary>
Get the attributes of a pty filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_mount_pty_fs" lineno="473">
<summary>
Mount a pty filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_unmount_pty_fs" lineno="491">
<summary>
Unmount a pty filesystem
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_relabel_pty_fs" lineno="509">
<summary>
Relabel from and to pty filesystem.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_dontaudit_getattr_pty_dirs" lineno="529">
<summary>
Do not audit attempts to get the
attributes of the /dev/pts directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_search_ptys" lineno="547">
<summary>
Search the contents of the /dev/pts directory.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_dontaudit_search_ptys" lineno="567">
<summary>
Do not audit attempts to search the
contents of the /dev/pts directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_list_ptys" lineno="587">
<summary>
Read the /dev/pts directory to
list all ptys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_relabel_ptys_dirs" lineno="606">
<summary>
Relabel the /dev/pts directory
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_dontaudit_list_ptys" lineno="625">
<summary>
Do not audit attempts to read the
/dev/pts directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_dontaudit_manage_pty_dirs" lineno="644">
<summary>
Do not audit attempts to create, read,
write, or delete the /dev/pts directory.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_getattr_generic_ptys" lineno="662">
<summary>
Get the attributes of generic pty devices.
</summary>
<param name="domain">
<summary>
Domain to allow
</summary>
</param>
</interface>
<interface name="term_dontaudit_getattr_generic_ptys" lineno="680">
<summary>
Do not audit attempts to get the attributes
of generic pty devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_ioctl_generic_ptys" lineno="698">
<summary>
ioctl of generic pty devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_setattr_generic_ptys" lineno="720">
<summary>
Allow setting the attributes of
generic pty devices.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_dontaudit_setattr_generic_ptys" lineno="740">
<summary>
Dontaudit setting the attributes of
generic pty devices.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_use_generic_ptys" lineno="760">
<summary>
Read and write the generic pty
type. This is generally only used in
the targeted policy.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_dontaudit_use_generic_ptys" lineno="782">
<summary>
Do not audit attempts to read and
write the generic pty type. This is
generally only used in the targeted policy.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_setattr_controlling_term" lineno="801">
<summary>
Set the attributes of the tty device
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_use_controlling_term" lineno="821">
<summary>
Read and write the controlling
terminal (/dev/tty).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_getattr_ptmx" lineno="840">
<summary>
Get the attributes of the pty multiplexor (/dev/ptmx).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_dontaudit_getattr_ptmx" lineno="859">
<summary>
Do not audit attempts to get attributes
on the pty multiplexor (/dev/ptmx).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_use_ptmx" lineno="877">
<summary>
Read and write the pty multiplexor (/dev/ptmx).
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_dontaudit_use_ptmx" lineno="897">
<summary>
Do not audit attempts to read and
write the pty multiplexor (/dev/ptmx).
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_getattr_all_ptys" lineno="917">
<summary>
Get the attributes of all
pty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_getattr_all_ptys" lineno="940">
<summary>
Do not audit attempts to get the
attributes of any pty
device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_setattr_all_ptys" lineno="960">
<summary>
Set the attributes of all
pty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_relabelto_all_ptys" lineno="981">
<summary>
Relabel to all ptys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_write_all_ptys" lineno="999">
<summary>
Write to all ptys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_use_all_ptys" lineno="1019">
<summary>
Read and write all ptys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_use_all_inherited_ptys" lineno="1041">
<summary>
Read and write all inherited ptys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_use_all_ptys" lineno="1060">
<summary>
Do not audit attempts to read or write any ptys.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_relabel_all_ptys" lineno="1078">
<summary>
Relabel from and to all pty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_getattr_all_user_ptys" lineno="1100">
<summary>
Get the attributes of all user
pty device nodes. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_getattr_all_user_ptys" lineno="1117">
<summary>
Do not audit attempts to get the
attributes of any user pty
device nodes. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_setattr_all_user_ptys" lineno="1134">
<summary>
Set the attributes of all user
pty device nodes. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_relabelto_all_user_ptys" lineno="1149">
<summary>
Relabel to all user ptys. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_write_all_user_ptys" lineno="1164">
<summary>
Write to all user ptys. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_use_all_user_ptys" lineno="1180">
<summary>
Read and write all user ptys. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_use_all_user_ptys" lineno="1196">
<summary>
Do not audit attempts to read any
user ptys. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_relabel_all_user_ptys" lineno="1212">
<summary>
Relabel from and to all user
user pty device nodes. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_getattr_unallocated_ttys" lineno="1229">
<summary>
Get the attributes of all unallocated
tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_open_unallocated_ttys" lineno="1249">
<summary>
Allow open access for all unallocated
tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_dontaudit_getattr_unallocated_ttys" lineno="1271">
<summary>
Do not audit attempts to get the attributes
of all unallocated tty device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_setattr_unallocated_ttys" lineno="1291">
<summary>
Set the attributes of all unallocated
tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_setattr_unallocated_ttys" lineno="1311">
<summary>
Do not audit attempts to set the attributes
of unallocated tty device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_dontaudit_ioctl_unallocated_ttys" lineno="1330">
<summary>
Do not audit attempts to ioctl
unallocated tty device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_watch_unallocated_ttys" lineno="1348">
<summary>
Watch unallocated tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_watch_reads_unallocated_ttys" lineno="1366">
<summary>
Watch_reads unallocated tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_relabel_unallocated_ttys" lineno="1385">
<summary>
Relabel from and to the unallocated
tty type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_mounton_unallocated_ttys" lineno="1405">
<summary>
Mounton unallocated tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_reset_tty_labels" lineno="1424">
<summary>
Relabel from all user tty types to
the unallocated tty type.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_append_unallocated_ttys" lineno="1445">
<summary>
Append to unallocated ttys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_write_unallocated_ttys" lineno="1464">
<summary>
Write to unallocated ttys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_use_unallocated_ttys" lineno="1484">
<summary>
Read and write unallocated ttys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_use_unallocated_ttys" lineno="1504">
<summary>
Do not audit attempts to read or
write unallocated ttys.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_use_usb_ttys" lineno="1524">
<summary>
Read and write USB tty character
device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_setattr_usb_ttys" lineno="1544">
<summary>
Setattr on USB tty character
device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_getattr_all_ttys" lineno="1563">
<summary>
Get the attributes of all tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_getattr_all_ttys" lineno="1585">
<summary>
Do not audit attempts to get the
attributes of any tty device nodes.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_setattr_all_ttys" lineno="1607">
<summary>
Set the attributes of all tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_relabel_all_ttys" lineno="1626">
<summary>
Relabel from and to all tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_write_all_ttys" lineno="1645">
<summary>
Write to all ttys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_use_all_ttys" lineno="1665">
<summary>
Read and write all ttys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_use_all_inherited_ttys" lineno="1685">
<summary>
Read and write all inherited ttys.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_use_all_ttys" lineno="1705">
<summary>
Do not audit attempts to read or write
any ttys.
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_getattr_all_user_ttys" lineno="1725">
<summary>
Get the attributes of all user tty
device nodes. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_getattr_all_user_ttys" lineno="1742">
<summary>
Do not audit attempts to get the
attributes of any user tty
device nodes. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_setattr_all_user_ttys" lineno="1759">
<summary>
Set the attributes of all user tty
device nodes. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_relabel_all_user_ttys" lineno="1775">
<summary>
Relabel from and to all user
user tty device nodes. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_write_all_user_ttys" lineno="1790">
<summary>
Write to all user ttys. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_use_all_user_ttys" lineno="1806">
<summary>
Read and write all user to all user ttys. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
<rolecap/>
</interface>
<interface name="term_dontaudit_use_all_user_ttys" lineno="1822">
<summary>
Do not audit attempts to read or write
any user ttys. (Deprecated)
</summary>
<param name="domain">
<summary>
Domain to not audit.
</summary>
</param>
</interface>
<interface name="term_watch_user_ttys" lineno="1837">
<summary>
Watch user tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_watch_reads_user_ttys" lineno="1855">
<summary>
Watch_reads user tty device nodes.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_getattr_virtio_console" lineno="1873">
<summary>
Getattr on the virtio console.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_use_virtio_console" lineno="1891">
<summary>
Read from and write to the virtio console.
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
<interface name="term_filetrans_all_named_dev" lineno="1910">
<summary>
Create all named term devices with the correct label
</summary>
<param name="domain">
<summary>
Domain allowed access.
</summary>
</param>
</interface>
</module>
<module name="ubac" filename="policy/modules/kernel/ubac.if">
<summary>User-based access control policy</summary>
<required val="true">
Contains attributes used in UBAC policy.
</required>
<interface name="ubac_constrained" lineno="29">
<summary>
Constrain by user-based access control (UBAC).
</summary>
<desc>
<p>
Constrain the specified type by user-based
access control (UBAC). Typically, these are
user processes or user files that need to be
differentiated by SELinux user. Normally this
does not include administrative or privileged
programs. For the UBAC rules to be enforced,
both the subject (source) type and the object
(target) types must be UBAC constrained.
</p>
</desc>
<param name="type">
<summary>
Type to be constrained by UBAC.
</summary>
</param>
<infoflow type="none"/>
</interface>
<interface name="ubac_file_exempt" lineno="47">
<summary>
Exempt user-based access control for files.
</summary>
<param name="domain">
<summary>
Domain to be exempted.
</summary>
</param>
</interface>
<interface name="ubac_process_exempt" lineno="65">
<summary>
Exempt user-based access control for processes.
</summary>
<param name="domain">
<summary>
Domain to be exempted.
</summary>
</param>
</interface>
<interface name="ubac_fd_exempt" lineno="83">
<summary>
Exempt user-based access control for file descriptors.
</summary>
<param name="domain">
<summary>
Domain to be exempted.
</summary>
</param>
</interface>
<interface name="ubac_socket_exempt" lineno="101">
<summary>
Exempt user-based access control for sockets.
</summary>
<param name="domain">
<summary>
Domain to be exempted.
</summary>
</param>
</interface>
<interface name="ubac_sysvipc_exempt" lineno="119">
<summary>
Exempt user-based access control for SysV IPC.
</summary>
<param name="domain">
<summary>
Domain to be exempted.
</summary>
</param>
</interface>
<interface name="ubac_xwin_exempt" lineno="137">
<summary>
Exempt user-based access control for X Windows.
</summary>
<param name="domain">
<summary>
Domain to be exempted.
</summary>
</param>
</interface>
<interface name="ubac_dbus_exempt" lineno="155">
<summary>
Exempt user-based access control for dbus.
</summary>
<param name="domain">
<summary>
Domain to be exempted.
</summary>
</param>
</interface>
<interface name="ubac_key_exempt" lineno="173">
<summary>
Exempt user-based access control for keys.
</summary>
<param name="domain">
<summary>
Domain to be exempted.
</summary>
</param>
</interface>
<interface name="ubac_db_exempt" lineno="191">
<summary>
Exempt user-based access control for databases.
</summary>
<param name="domain">
<summary>
Domain to be exempted.
</summary>
</param>
</interface>
</module>
<module name="unlabelednet" filename="policy/modules/kernel/unlabelednet.if">
<summary> Policy for allowing confined domains to use unlabeled_t packets</summary>
</module>