Having an issue figuring out how the all-zones option effect security if 
applied to a physical interface and not VNI*. Attempting to configure a Solaris 
10 U3 TX system with 2 NICs to route between CIPSO and UNLABELED traffic. We 
have a server that does not understand CIPSO ( that we access 
through a route ( that does not understand CIPSO. The Solaris 
gateway “router” has an interface ( that talks to the router. 
The other interface on the Solaris gateway is ( One labeled 
zone exits called unclassified. We have attempted the following gateway 
configurations but uncertain what this does to security since this is a TX 

1.Configured global with iprb0= and iprb1=
   Configured unclassified zone iprb0:1= and iprb1= 
If we start a ping from a Solaris TX CIPSO workstation ( through 
the gateway to after 1500 pings communication stops. With this 
setup we are unable to make the persistent route work (

2.Configured global with iprb0= all-zones and 
iprb1= all-zones. Configured unclassified zone without any 
network settings. This seems to work even without the unclassified zone booted. 
Persistent routes and communication does not stop working. What does this do to 
security of the system? All the documentation I have seen uses VNI interface 
for the labeled zones to communicate to the global zone. Also looking at using 
IPSec and not sure of what effect this will have? 

Solaris 10 TX workstation
            Solaris 10 TX gateway
               NON-CIPSO Router
    NON-CIPSO Server
This message posted from opensolaris.org
zones-discuss mailing list

Reply via email to