2 <!DOCTYPE service_bundle SYSTEM "/usr/share/lib/xml/dtd/service_bundle.dtd.1">
4 Copyright 2009 Sun Microsystems, Inc. All rights reserved.
5 Use is subject to license terms.
9 The contents of this file are subject to the terms of the
10 Common Development and Distribution License (the "License").
11 You may not use this file except in compliance with the License.
13 You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
14 or http://www.opensolaris.org/os/licensing.
15 See the License for the specific language governing permissions
16 and limitations under the License.
18 When distributing Covered Code, include this CDDL HEADER in each
19 file and include the License file at usr/src/OPENSOLARIS.LICENSE.
20 If applicable, add the following below this CDDL HEADER, with the
21 fields enclosed by brackets "[]" replaced with your own identifying
22 information: Portions Copyright [yyyy] [name of copyright owner]
26 NOTE: This service manifest is not editable; its contents will
27 be overwritten by package or patch operations, including
28 operating system upgrade. Make customizations in a different
31 <service_bundle type='manifest' name='SUNWcsr:policy'>
34 name='network/ipsec/policy'
38 <!-- The 'policy' service is delivered enabled for backwards
39 compatability with existing adminstrative proceedure. -->
41 <create_default_instance enabled='true' />
45 <!-- Read/Write access to /var/run required for lock files -->
48 grouping='require_all'
52 value='svc:/system/filesystem/minimal'
55 <!-- Kernel needs to know supported IPsec algorithms -->
58 grouping='require_all'
62 value='svc:/network/ipsec/ipsecalgs'
65 <!-- General networking services should not start untill IPsec
66 policy has been configured. -->
69 grouping='optional_all'
72 value='svc:/milestone/network'
79 exec='/usr/sbin/ipsecconf -q -a %{config/config_file}'
86 exec='/usr/sbin/ipsecconf -q -F -a %{config/config_file}'
93 exec='/usr/sbin/ipsecconf -F'
97 <property_group name='general' type='framework'>
98 <!-- A user with this authorization can:
100 svcadm restart policy
101 svcadm refresh policy
102 svcadm mark <state> policy
105 see auths(1) and user_attr(4)-->
108 name='action_authorization'
110 value='solaris.smf.manage.ipsec'
112 <!-- A user with this authorization can:
113 svcadm disable policy
116 see auths(1) and user_attr(4)-->
119 name='value_authorization'
121 value='solaris.smf.manage.ipsec'
125 <!-- The properties defined below can be changed by a user
126 with 'solaris.smf.value.ipsec' authorization using the
131 svccfg -s ipsec/policy setprop config/config_file = /new/config_file
133 The new configurations will be read on service refresh:
135 svcadm refresh ipsec/policy
137 Note: svcadm stop/start does not use the new property
138 until after the service has been refreshed.
140 ***Dont edit this manifest to change these properties! -->
142 <property_group name='config' type='application'>
146 value='/etc/inet/ipsecinit.conf'
149 name='value_authorization'
151 value='solaris.smf.value.ipsec'
155 <property_group name='startd' type='framework'>
163 <stability value='Unstable' />
167 <loctext xml:lang='C'>
168 IPsec policy initialization
172 <loctext xml:lang='C'>
173 IPsec policy configuration involves
174 loading rules into the kernel Security
175 Policy Database (SPD)
179 <manpage title='ipsecconf' section='1M'
180 manpath='/usr/share/man' />