2 .\" Copyright (c) 2008, Sun Microsystems, Inc. All Rights Reserved.
3 .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
4 .\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
5 .\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
6 .TH TNCTL 1M "Mar 6, 2008"
8 tnctl \- configure Trusted Extensions network parameters
12 \fB/usr/sbin/tnctl\fR [\fB-dfv\fR] [\fB-h\fR \fIhost\fR [/\fIprefix\fR] [:\fItemplate\fR]]
13 [\fB-m\fR \fIzone\fR:\fImlp\fR:\fIshared-mlp\fR][\fB-t\fR \fItemplate\fR [:\fIkey=val\fR [;\fIkey=val\fR]]]
14 [\fB-HTz\fR] \fIfile\fR]
20 \fBtnctl\fR provides an interface to manipulate trusted network parameters in
24 As part of Solaris Trusted Extensions initialization, \fBtnctl\fR is run in the
25 global zone by an \fBsmf\fR(5) script during system boot. The \fBtnctl\fR
26 command is not intended to be used during normal system administration.
27 Instead, if a local trusted networking database file is modified without using
28 the Solaris Management Console, the administrator first issues
29 \fBtnchkdb\fR(1M) to check the syntax, and then refreshes the kernel copy with
34 # \fBsvcadm restart svc:/network/tnctl\fR
41 See \fBWARNINGS\fR about the risks of changing remote host and template
42 information on a running system.
51 Delete matching entries from the kernel. The default is to add new entries.
53 When deleting MLPs, the MLP range must match exactly. MLPs are specified in the
58 \fIport\fR[-\fIport\fR]/\fIprotocol\fR
63 Where \fIport\fR can be a number in the range 1 to 65535. or any known service
64 (see \fBservices\fR(4)), and protocol can be a number in the range 1 to 255, or
65 any known protocol (see \fBprotocols\fR(4)).
75 Flush all kernel entries before loading the entries that are specified on the
76 command line. The flush does not take place unless at least one entry parsed
93 \fB\fB-h\fR \fIhost\fR[/\fIprefix\fR][:\fItemplate\fR]\fR
97 Update the kernel remote-host cache on the local host for the specified
98 \fIhost\fR or, if a template name is given, change the kernel's cache to use
99 the specified \fItemplate\fR. If \fIprefix\fR is not specified, then an implied
100 prefix length is determined according to the rules used for interpreting the
101 \fBtnrhdb\fR. If \fB-d\fR is specified, then a template name cannot be
108 \fB\fB-m\fR \fIzone\fR:\fImlp\fR:\fIshared-mlp\fR\fR
112 Modify the kernel's multilevel port (MLP) configuration cache for the specified
113 \fIzone\fR. \fIzone\fR specifies the zone to be updated. \fImlp\fR and
114 \fIshared-mlp\fR specify the MLPs for the zone-specific and shared IP
115 addresses. The \fIshared-mlp\fR field is effective in the global zone only.
121 \fB\fB-t\fR \fItemplate\fR[\fIkey=val\fR[;\fIkey=val\fR]]\fR
125 Update the kernel template cache for \fItemplate\fR or, if a list of
126 \fIkey=val\fR pairs is given, change the kernel's cache to use the specified
127 entry. If \fB-d\fR is specified, then \fIkey=val\fR pairs cannot be specified.
133 \fB\fB-T\fR \fIfile\fR\fR
137 Load all template entries in \fIfile\fR into the kernel cache.
143 \fB\fB-H\fR \fIfile\fR\fR
147 Load all remote host entries in \fIfile\fR into the kernel cache.
153 \fB\fB-z\fR \fIfile\fR\fR
157 Load just the global zone's MLPs from \fIfile\fR into the kernel cache. To
158 reload MLPs for a non-global zone, reboot the zone:
162 # \fBzoneadm -z\fR \fInon-global zone\fR \fBreboot\fR
172 See \fBattributes\fR(5) for descriptions of the following attributes:
180 ATTRIBUTE TYPE ATTRIBUTE VALUE
182 Interface Stability Uncommitted
189 \fB\fB/etc/security/tsol/tnrhdb\fR\fR
193 Trusted network remote-host database
199 \fB\fB/etc/security/tsol/tnrhtp\fR\fR
203 Trusted network remote-host templates
209 \fB\fB/etc/security/tsol/tnzonecfg\fR\fR
213 Trusted zone configuration database
219 \fB\fB/etc/nsswitch.conf\fR\fR
223 Configuration file for the name service switch
229 \fBsvcs\fR(1), \fBsvcadm\fR(1M), \fBtninfo\fR(1M), \fBtnd\fR(1M),
230 \fBtnchkdb\fR(1M), \fBzoneadm\fR(1M), \fBnsswitch.conf\fR(4),
231 \fBprotocols\fR(4), \fBservices\fR(4), \fBattributes\fR(5), \fBsmf\fR(5)
234 \fIHow to Synchronize Kernel Cache With Network Databases\fR in \fISolaris
235 Trusted Extensions Administrator\&'s Procedures\fR
239 Changing a template while the network is up can change the security view of an
240 undetermined number of hosts.
244 The functionality described on this manual page is available only if the system
245 is configured with Trusted Extensions.
248 The \fBtnctl\fR service is managed by the service management facility,
249 \fBsmf\fR(5), under the service identifier:
260 The service's status can be queried by using \fBsvcs\fR(1). Administrative
261 actions on this service, such as refreshing the kernel cache, can be performed
262 using \fBsvcadm\fR(1M), as in:
266 svcadm restart svc:/network/tnctl