HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
For example:
/* allow the parent to send signals to children */
send signal server_children
6.4.4 Network Rules
Network rules govern access to network interfaces. Network rules also govern
communication between processes that use INET domain communication (TCP/IP
sockets and streams). The default behavior is to deny access to the network.
Network endpoints are treated as objects labeled with the compartment of the process
that creates them. However, a network endpoint can be created by one process, then
passed to another process, which can run in a different compartment. Access checks
are performed on the compartment containing the endpoint when the endpoint was
created, not the current compartment. Additionally, the endpoint passes its compartment
configuration to accepting endpoints when it receives new connections.
INET domain endpoints are frequently used for interprocess communications. Be sure
to configure the compartments accordingly.
The syntax for a network rule is as follows:
(grant|deny) (server|client|bidir) (tcp|udp|raw [protonum] )
[port port_num] [peer[portport]] compartment_name
where:
Access Grants or denies the compartment access to the network
traffic in the specified compartment. The options are:
grant
deny
Direction Specifies which direction the rule applies to. The options are:
server: This rule applies to inbound requests only. For
TCP, only incoming connections are controlled by this
rule. For UDP and RAW, this rule applies to all inbound
packets.
client: This rule applies outbound requests only. For
TCP, only connection initiations are controlled by this
rule. For UDP and RAW, this rule applies to all
outbound packets.
bidir: This rule applies to both inbound and outbound
requests. For TCP, connections initiated and received
by the endpoint are controlled by this rule. For UDP and
RAW, this rule applies to all packets passing through
the endpoint.
118 Compartments