This chapter provides implementation details and procedures for securing a Solaris Trusted Extensions network.
Managing the Trusted Network (Task Map)
Configuring Trusted Network Databases (Task Map)
Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
Troubleshooting the Trusted Network (Task Map)